Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
From MaRDI portal
Publication:2269828
DOI10.1016/J.INS.2009.12.008zbMATH Open1191.94096OpenAlexW2029340819WikidataQ121084362 ScholiaQ121084362MaRDI QIDQ2269828FDOQ2269828
Authors: Yu Long, Kefei Chen
Publication date: 11 March 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2009.12.008
Recommendations
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- Topics in Cryptology – CT-RSA 2006
- An efficient certificateless threshold signcryption scheme
- scientific article; zbMATH DE number 2081075
- An efficient certificateless multi-receiver threshold decryption scheme
- Securing threshold cryptosystems against chosen ciphertext attack
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
threshold cryptosystemcertificatelesskey encapsulation mechanismchosen-ciphertext attackpairing based cryptosystem
Cites Work
- Breaking the short certificateless signature scheme
- Generic constructions of identity-based and certificateless kEMs
- Identity-based cryptosystems and signature schemes
- How to share a secret
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Certificateless public key cryptography
- Certificateless threshold ring signature
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Certificateless signcryption scheme in the standard model
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public Key Cryptography – PKC 2004
- Simulatability and security of certificateless threshold signatures
- Certificateless undeniable signature scheme
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- Title not available (Why is that?)
- Public Key Cryptography - PKC 2005
Cited In (9)
- An efficient certificateless multi-receiver threshold decryption scheme
- Generic Certificateless Key Encapsulation Mechanism
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- Topics in Cryptology – CT-RSA 2006
- Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption
- Certificateless threshold signature scheme from bilinear maps
- Forward-secure identity-based signature: security notions and construction
- Distributed certificateless key encapsulation mechanism secure against the adaptive adversary
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Uses Software
This page was built for publication: Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2269828)