Securing threshold cryptosystems against chosen ciphertext attack

From MaRDI portal
Publication:1601827

DOI10.1007/s00145-001-0020-9zbMath0997.94016OpenAlexW174706587WikidataQ121450489 ScholiaQ121450489MaRDI QIDQ1601827

Victor Shoup, Rosario Gennaro

Publication date: 27 June 2002

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-001-0020-9




Related Items (21)

Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistencyAdaptively secure threshold symmetric-key encryptionDynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionNew results and applications for multi-secret sharing schemesCCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsPractical Threshold Signatures Without Random OraclesImproved straight-line extraction in the random oracle model with applications to signature aggregationSigncryption schemes with threshold unsigncryption, and applicationsEfficient identity-based threshold decryption scheme from bilinear pairingsNew technique for chosen-ciphertext security based on non-interactive zero-knowledgePrivacy Preserving Data Mining within Anonymous Credential SystemsEfficient selective identity-based encryption without random oraclesZero-knowledge argument for simultaneous discrete logarithmsTag-KEM/DEM: A new framework for hybrid encryptionFully Secure Threshold UnsigncryptionFully secure ABE with outsourced decryption against chosen ciphertext attackNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsAd-Hoc Threshold Broadcast Encryption with Shorter CiphertextsCoin-based multi-party fair exchangeBlind Schnorr signatures and signed ElGamal encryption in the algebraic group model




This page was built for publication: Securing threshold cryptosystems against chosen ciphertext attack