Securing threshold cryptosystems against chosen ciphertext attack
From MaRDI portal
Publication:1601827
DOI10.1007/s00145-001-0020-9zbMath0997.94016OpenAlexW174706587WikidataQ121450489 ScholiaQ121450489MaRDI QIDQ1601827
Publication date: 27 June 2002
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-001-0020-9
threshold secret sharingpublic key cryptosystemchosen ciphertext attackthreshold cryptographyconsistency of decryptionsdiscrete logarithm identities
Related Items (21)
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency ⋮ Adaptively secure threshold symmetric-key encryption ⋮ Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions ⋮ Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption ⋮ New results and applications for multi-secret sharing schemes ⋮ CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts ⋮ Practical Threshold Signatures Without Random Oracles ⋮ Improved straight-line extraction in the random oracle model with applications to signature aggregation ⋮ Signcryption schemes with threshold unsigncryption, and applications ⋮ Efficient identity-based threshold decryption scheme from bilinear pairings ⋮ New technique for chosen-ciphertext security based on non-interactive zero-knowledge ⋮ Privacy Preserving Data Mining within Anonymous Credential Systems ⋮ Efficient selective identity-based encryption without random oracles ⋮ Zero-knowledge argument for simultaneous discrete logarithms ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ Fully Secure Threshold Unsigncryption ⋮ Fully secure ABE with outsourced decryption against chosen ciphertext attack ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts ⋮ Coin-based multi-party fair exchange ⋮ Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
This page was built for publication: Securing threshold cryptosystems against chosen ciphertext attack