people, each one holding a small secret password only, to help a leader to perform the
private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined
this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal
decryption only, and relied on the DDH assumption, excluding any recent pairing-based
cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing …