Efficient dynamic threshold identity-based encryption with constant-size ciphertext
From MaRDI portal
Recommendations
- Dynamic Threshold Public-Key Encryption
- ID-based threshold decryption secure against adaptive chosen-ciphertext attack
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
Cites work
- Advances in cryptology - CRYPTO '89. Proceedings of a conference held at the University of California, Santa Barbara, CA (USA), August 20-24, 1989
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Dynamic Threshold Public-Key Encryption
- Efficient revocation and threshold pairing based cryptosystems
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- How to share a function securely
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Public Key Cryptography – PKC 2004
- Secure integration of asymmetric and symmetric encryption schemes
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Topics in Cryptology – CT-RSA 2006
Cited in
(1)
This page was built for publication: Efficient dynamic threshold identity-based encryption with constant-size ciphertext
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q897859)