Skip to main content

Context-Dependent Threshold Decryption and Its Applications

Publication ,  Conference
Boneh, D; Bünz, B; Nayak, K; Rotem, L; Shoup, V
Published in: Lecture Notes in Computer Science
January 1, 2026

In a threshold decryption system, a secret key is split across a number of parties so that any threshold of them can decrypt a given ciphertext. We introduce a new concept in threshold decryption called a decryption context, which is an additional argument that is used during decryption. The context ensures that decryption shares that are generated for a ciphertext using different contexts are isolated from each other and cannot be jointly used to decrypt the ciphertext. For example, suppose the decryption threshold is t. Further, suppose that less than t decryption shares are generated for a ciphertext c under one context, and less than t decryption shares are generated for c under a different context. Then this set of shares is insufficient to decrypt c even if the total number of shares exceeds t. This new concept has several important applications, most notably for implementing an encrypted mempool in a consensus protocol. We give two CCA-secure threshold decryption constructions that support context. One is based on ElGamal encryption, and the other is generic showing how to add context to any CCA-secure threshold decryption system without changing the encryption algorithm.

Duke Scholars

Published In

Lecture Notes in Computer Science

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2026

Volume

16250 LNCS

Start / End Page

506 / 538

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Boneh, D., Bünz, B., Nayak, K., Rotem, L., & Shoup, V. (2026). Context-Dependent Threshold Decryption and Its Applications. In Lecture Notes in Computer Science (Vol. 16250 LNCS, pp. 506–538). https://doi.org/10.1007/978-981-95-5119-4_16
Boneh, D., B. Bünz, K. Nayak, L. Rotem, and V. Shoup. “Context-Dependent Threshold Decryption and Its Applications.” In Lecture Notes in Computer Science, 16250 LNCS:506–38, 2026. https://doi.org/10.1007/978-981-95-5119-4_16.
Boneh D, Bünz B, Nayak K, Rotem L, Shoup V. Context-Dependent Threshold Decryption and Its Applications. In: Lecture Notes in Computer Science. 2026. p. 506–38.
Boneh, D., et al. “Context-Dependent Threshold Decryption and Its Applications.” Lecture Notes in Computer Science, vol. 16250 LNCS, 2026, pp. 506–38. Scopus, doi:10.1007/978-981-95-5119-4_16.
Boneh D, Bünz B, Nayak K, Rotem L, Shoup V. Context-Dependent Threshold Decryption and Its Applications. Lecture Notes in Computer Science. 2026. p. 506–538.

Published In

Lecture Notes in Computer Science

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2026

Volume

16250 LNCS

Start / End Page

506 / 538

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences