Timed-release computational secret sharing and threshold encryption
From MaRDI portal
Publication:1692147
DOI10.1007/s10623-016-0324-2zbMath1381.94105OpenAlexW2573951204WikidataQ122224806 ScholiaQ122224806MaRDI QIDQ1692147
Publication date: 26 January 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-016-0324-2
threshold cryptographymultiple encryptionidentity-based key encapsulation mechanismcomputational secret sharingtimed-release security
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Generic constructions of identity-based and certificateless kEMs
- Déjà Q: Encore! Un Petit IBE
- Timed-Release Secret Sharing Schemes with Information Theoretic Security
- Timed-Release Computational Secret Sharing Scheme and Its Applications
- Timed Release of Standard Digital Signatures
- Optimized Self-Synchronizing Mode of Operation
- How to share a secret
- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability
- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
- Improved Anonymous Timed-Release Encryption
- Timed-Release and Key-Insulated Public Key Encryption
- Non-interactive Zero-Knowledge Arguments for Voting
- A Generic Construction of Timed-Release Encryption with Pre-open Capability
- Efficient dispersal of information for security, load balancing, and fault tolerance
- Securing threshold cryptosystems against chosen ciphertext attack
- On-line secret sharing
- On secret sharing systems
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Information and Communications Security
- Theory of Cryptography
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Topics in Cryptology – CT-RSA 2006
- Computer Aided Verification
- Public Key Cryptography – PKC 2004