Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
From MaRDI portal
Publication:2891477
DOI10.1007/978-3-642-28914-9_5zbMath1303.94089OpenAlexW1669658597MaRDI QIDQ2891477
Benoît Libert, Mordechai M. Yung
Publication date: 15 June 2012
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_5
robustnesspublic-key encryptionnon-interactivitychosen-ciphertext securityadaptive corruptionsThreshold cryptography
Related Items (10)
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions ⋮ Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model ⋮ Linearly homomorphic structure-preserving signatures and their applications ⋮ Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts ⋮ Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
This page was built for publication: Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions