Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions
From MaRDI portal
Publication:3194590
DOI10.1007/978-3-319-19962-7_5zbMath1358.94077OpenAlexW2189376121MaRDI QIDQ3194590
Keita Emura, Kazuo Ohta, Jacob C. N. Schuldt, Yusuke Sakai, Goichiro Hanaoka
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_5
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Multiple assignment scheme for sharing secret
- Securing threshold cryptosystems against chosen ciphertext attack
- How to share a function securely
- Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
- Adaptively Secure Non-interactive Threshold Cryptosystems
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Computational Verifiable Secret Sharing Revisited
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
- Dynamic Threshold Public-Key Encryption
- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Public-Key Encryption with Non-interactive Opening
- Theory of Cryptography
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2006
- Theory of Cryptography
This page was built for publication: Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions