Pages that link to "Item:Q4250756"
From MaRDI portal
The following pages link to An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract) (Q4250756):
Displayed 34 items.
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency (Q278732) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts (Q456458) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- Electronic jury voting protocols (Q596143) (← links)
- Efficient dynamic threshold identity-based encryption with constant-size ciphertext (Q897859) (← links)
- Extensions of access structures and their cryptographic applications (Q989607) (← links)
- Adaptively secure distributed PRFs from LWE (Q1631339) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\) (Q2043324) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Adaptively secure threshold symmetric-key encryption (Q2152046) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Computational fuzzy extractors (Q2216116) (← links)
- Efficient hybrid encryption from ID-based encryption (Q2267789) (← links)
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism (Q2269828) (← links)
- Threshold public key encryption scheme resilient against continual leakage without random oracles (Q2418660) (← links)
- The reactive simulatability (RSIM) framework for asynchronous systems (Q2464139) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- Protecting against key-exposure: strongly key-insulated encryption with optimal threshold (Q2502164) (← links)
- Fuzzy asymmetric password-authenticated key exchange (Q2692404) (← links)
- Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts (Q2864362) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Efficient Threshold Encryption from Lossy Trapdoor Functions (Q3102790) (← links)
- Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions (Q3194590) (← links)
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts (Q3503869) (← links)
- Simplified Submission of Inputs to Protocols (Q3540053) (← links)
- Fair Traceable Multi-Group Signatures (Q3603011) (← links)
- Verifiable Elections That Scale for Free (Q4916026) (← links)
- Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model (Q5087275) (← links)
- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings (Q5502747) (← links)
- Encapsulated search index: public-key, sub-linear, distributed, and delegatable (Q6113958) (← links)
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext (Q6123051) (← links)