Provably secure threshold public-key encryption with adaptive security and short ciphertexts
From MaRDI portal
(Redirected from Publication:456458)
Recommendations
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Dynamic Threshold Public-Key Encryption
- Efficient forward-secure threshold public key encryption
- Threshold public key encryption scheme resilient against continual leakage without random oracles
- Dynamic threshold public-key encryption with decryption consistency from static assumptions
Cites work
- scientific article; zbMATH DE number 1304090 (Why is no real title available?)
- scientific article; zbMATH DE number 1024079 (Why is no real title available?)
- scientific article; zbMATH DE number 1942412 (Why is no real title available?)
- Ad-hoc threshold broadcast encryption with shorter ciphertexts
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Adaptively secure non-interactive threshold cryptosystems
- Advances in Cryptology – CRYPTO 2004
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Asymmetric Group Key Agreement
- Bridging broadcast encryption and group key agreement
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Certificateless threshold signature scheme from bilinear maps
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Dynamic Threshold Public-Key Encryption
- Efficient generic on-line/off-line (threshold) signatures without key exposure
- Efficient revocation and threshold pairing based cryptosystems
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- How to share a secret
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- Public Key Cryptography – PKC 2004
- Public key broadcast encryption for stateless receivers
- Security of Ramp Schemes
- Simulatable certificateless two-party authenticated key agreement protocol
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Cited in
(16)- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- More constructions of re-splittable threshold public key encryption
- Practical (fully) distributed signatures provably secure in the standard model
- scientific article; zbMATH DE number 5009201 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- A Generic Construction for Token-Controlled Public Key Encryption
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- Lattice-based identity-based resplittable threshold public key encryption scheme
- Dynamic threshold public-key encryption with decryption consistency from static assumptions
- Efficient threshold encryption from lossy trapdoor functions
- Provably secure three party encrypted key exchange scheme with explicit authentication
- Efficient dynamic threshold identity-based encryption with constant-size ciphertext
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Dynamic Threshold Public-Key Encryption
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
This page was built for publication: Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q456458)