Securing threshold cryptosystems against chosen ciphertext attack

From MaRDI portal
Revision as of 16:17, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4249624

DOI10.1007/BFB0054113zbMath0919.94031MaRDI QIDQ4249624

Rosario Gennaro, Victor Shoup

Publication date: 9 September 1999

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)





Related Items (34)

Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiabilityConstructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistencyGeneric Construction of Chosen Ciphertext Secure Proxy Re-EncryptionProtecting the privacy of voters: new definitions of ballot secrecy for e-votingParameter-hiding order revealing encryptionOn ASGS framework: general requirements and an example of implementationDynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelDistributed certificateless key encapsulation mechanism secure against the adaptive adversaryGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionIdentity-based threshold decryption on access structureA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor samplingTimed-release computational secret sharing and threshold encryptionChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextBetter than advertised security for non-interactive threshold signaturesAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsSimplified Submission of Inputs to ProtocolsCertificateless threshold cryptosystem secure against chosen-ciphertext attackAdaptively Secure Non-interactive Threshold CryptosystemsVerifiable Elections That Scale for FreeStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsEfficient hybrid encryption from ID-based encryptionEfficient chosen-ciphertext secure certificateless threshold key encapsulation mechanismAdaptive Proofs Have Straightline Extractors (in the Random Oracle Model)Protecting against key-exposure: strongly key-insulated encryption with optimal thresholdFair Traceable Multi-Group SignaturesFast secure two-party ECDSA signingA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksBandwidth-efficient threshold EC-DSAAn efficient certificateless multi-receiver threshold decryption schemeNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsEfficient Threshold Encryption from Lossy Trapdoor FunctionsCryptographic Voting — A Gentle IntroductionAdaptively secure distributed public-key systems.







This page was built for publication: Securing threshold cryptosystems against chosen ciphertext attack