An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
From MaRDI portal
Publication:4414697
Recommendations
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- scientific article; zbMATH DE number 176566
- scientific article; zbMATH DE number 1302835
- Securing threshold cryptosystems against chosen ciphertext attack
- Using hash functions as a hedge against chosen ciphertext attack
Cited in
(7)- scientific article; zbMATH DE number 1504547 (Why is no real title available?)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- On indifferentiable hashing into the Jacobian of hyperelliptic curves of genus 2
- A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
- Adaptively secure non-interactive threshold cryptosystems
- Two-server password-only authenticated key exchange
- scientific article; zbMATH DE number 2081075 (Why is no real title available?)
This page was built for publication: An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4414697)