Certificateless threshold cryptosystem secure against chosen-ciphertext attack
From MaRDI portal
Recommendations
- ID-based threshold decryption secure against adaptive chosen-ciphertext attack
- Securing threshold cryptosystems against chosen ciphertext attack
- Securing threshold cryptosystems against chosen ciphertext attack
- scientific article; zbMATH DE number 2081075
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
Cites work
- scientific article; zbMATH DE number 177613 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 1024075 (Why is no real title available?)
- scientific article; zbMATH DE number 2081075 (Why is no real title available?)
- scientific article; zbMATH DE number 2163009 (Why is no real title available?)
- A note on variable threshold concept lattices: threshold-based operators are reducible to classical concept-forming operators
- A novel efficient \((t,n)\) threshold proxy signature scheme
- Advances in Cryptology - EUROCRYPT 2004
- Certificateless public key cryptography
- Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
- Cryptology and Network Security
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Generic constructions of identity-based and certificateless kEMs
- How to share a secret
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Information Security and Privacy
- Noninteractive Zero-Knowledge
- Optimal resilient threshold GQ signatures
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2006
- Public Key Cryptography – PKC 2004
- Securing threshold cryptosystems against chosen ciphertext attack
- Simulatability and security of certificateless threshold signatures
- Threshold-based declustering
Cited in
(12)- ID-based threshold decryption secure against adaptive chosen-ciphertext attack
- Certificateless threshold ring signature
- Self-generated-certificate public key encryption without pairing and its application
- Secure public-key encryption scheme without random oracles
- Adaptive chosen ciphertext secure threshold key escrow scheme from pairing
- Certificateless signcryption scheme in the standard model
- Efficient certificateless proxy signature scheme
- Certificateless proxy signature from RSA
- Topics in Cryptology – CT-RSA 2006
- ID-based threshold decryption secure against chosen plaintext attack
- An efficient certificateless multi-receiver threshold decryption scheme
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
This page was built for publication: Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2465333)