Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
From MaRDI portal
Publication:2269828
Recommendations
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- Topics in Cryptology – CT-RSA 2006
- An efficient certificateless threshold signcryption scheme
- scientific article; zbMATH DE number 2081075
- An efficient certificateless multi-receiver threshold decryption scheme
- Securing threshold cryptosystems against chosen ciphertext attack
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
Cites work
- scientific article; zbMATH DE number 177613 (Why is no real title available?)
- scientific article; zbMATH DE number 1302836 (Why is no real title available?)
- scientific article; zbMATH DE number 2081075 (Why is no real title available?)
- scientific article; zbMATH DE number 2163009 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Breaking the short certificateless signature scheme
- Certificateless public key cryptography
- Certificateless signcryption scheme in the standard model
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Certificateless threshold ring signature
- Certificateless undeniable signature scheme
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Efficient Identity-Based Encryption Without Random Oracles
- Generic constructions of identity-based and certificateless kEMs
- How to share a secret
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Key Replacement Attack Against a Generic Construction of Certificateless Signature
- Public Key Cryptography - PKC 2005
- Public Key Cryptography – PKC 2004
- Securing threshold cryptosystems against chosen ciphertext attack
- Simulatability and security of certificateless threshold signatures
Cited in
(9)- Certificateless threshold signature scheme from bilinear maps
- Forward-secure identity-based signature: security notions and construction
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- Distributed certificateless key encapsulation mechanism secure against the adaptive adversary
- Topics in Cryptology – CT-RSA 2006
- Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption
- An efficient certificateless multi-receiver threshold decryption scheme
- Generic Certificateless Key Encapsulation Mechanism
This page was built for publication: Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2269828)