Identity-based threshold decryption on access structure
From MaRDI portal
Publication:407450
DOI10.1007/S12204-011-1177-5zbMATH Open1294.94099OpenAlexW1965199636MaRDI QIDQ407450FDOQ407450
Authors: Hua-Wang Qin, Xiao-hua Zhu, Yue-Wei Dai
Publication date: 2 September 2014
Published in: Journal of Shanghai Jiaotong University (Science) (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12204-011-1177-5
Recommendations
Cites Work
- Identity-Based Cryptosystems and Signature Schemes
- How to share a secret
- Title not available (Why is that?)
- Title not available (Why is that?)
- Securing threshold cryptosystems against chosen ciphertext attack
- Topics in Cryptology – CT-RSA 2006
- Advances in Cryptology - EUROCRYPT 2004
- Efficient revocation and threshold pairing based cryptosystems
- Title not available (Why is that?)
- Public Key Cryptography – PKC 2004
Cited In (8)
- A threshold decryption scheme without session keys
- An identity based threshold scheme
- ID-based threshold decryption secure against chosen plaintext attack
- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng
- ID-based threshold decryption secure against adaptive chosen-ciphertext attack
- Public Key Cryptography – PKC 2004
- Efficient identity-based threshold decryption scheme from bilinear pairings
- Efficient ID-based multi-receiver threshold decryption
This page was built for publication: Identity-based threshold decryption on access structure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q407450)