Pages that link to "Item:Q5898566"
From MaRDI portal
The following pages link to Topics in Cryptology – CT-RSA 2006 (Q5898566):
Displaying 29 items.
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency (Q278732) (← links)
- Identity-based threshold decryption on access structure (Q407450) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Efficient dynamic threshold identity-based encryption with constant-size ciphertext (Q897859) (← links)
- Extensions of access structures and their cryptographic applications (Q989607) (← links)
- Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability (Q1616185) (← links)
- Timed-release computational secret sharing and threshold encryption (Q1692147) (← links)
- Efficient identity-based threshold decryption scheme from bilinear pairings (Q1712600) (← links)
- Homomorphic encryption systems statement: trends and challenges (Q2026280) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Adaptively secure threshold symmetric-key encryption (Q2152046) (← links)
- Multi-rate threshold FlipThem (Q2167726) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Efficient hybrid encryption from ID-based encryption (Q2267789) (← links)
- Threshold public key encryption scheme resilient against continual leakage without random oracles (Q2418660) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- All-in-one group-oriented cryptosystem based on bilinear pairing (Q2465336) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Efficient Threshold Encryption from Lossy Trapdoor Functions (Q3102790) (← links)
- Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions (Q3194590) (← links)
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts (Q3503869) (← links)
- Practical Threshold Signatures Without Random Oracles (Q3503882) (← links)
- Simplified Submission of Inputs to Protocols (Q3540053) (← links)
- Fully Secure Threshold Unsigncryption (Q4933226) (← links)
- Group Signatures with Decentralized Tracing (Q5040414) (← links)
- Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model (Q5087275) (← links)
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts (Q5738790) (← links)