An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
From MaRDI portal
Publication:4414697
DOI10.1007/3-540-36288-6_4zbMATH Open1033.94533OpenAlexW206433945MaRDI QIDQ4414697FDOQ4414697
Authors: Philip MacKenzie
Publication date: 27 July 2003
Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36288-6_4
Recommendations
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- scientific article; zbMATH DE number 176566
- scientific article; zbMATH DE number 1302835
- Securing threshold cryptosystems against chosen ciphertext attack
- Using hash functions as a hedge against chosen ciphertext attack
Cited In (7)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Title not available (Why is that?)
- Title not available (Why is that?)
- On indifferentiable hashing into the Jacobian of hyperelliptic curves of genus 2
- Adaptively secure non-interactive threshold cryptosystems
- A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
- Two-server password-only authenticated key exchange
This page was built for publication: An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4414697)