Provably secure threshold public-key encryption with adaptive security and short ciphertexts
From MaRDI portal
Publication:456458
DOI10.1016/J.INS.2012.04.038zbMATH Open1250.94042OpenAlexW1967316369WikidataQ120908110 ScholiaQ120908110MaRDI QIDQ456458FDOQ456458
Authors: Bo Qin, Qianhong Wu, Lei Zhang, Oriol Farràs, Josep Domingo-Ferrer
Publication date: 25 October 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2012.04.038
Recommendations
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Dynamic Threshold Public-Key Encryption
- Efficient forward-secure threshold public key encryption
- Threshold public key encryption scheme resilient against continual leakage without random oracles
- Dynamic threshold public-key encryption with decryption consistency from static assumptions
Cites Work
- How to share a secret
- Public key broadcast encryption for stateless receivers
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Adaptively secure non-interactive threshold cryptosystems
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Dynamic Threshold Public-Key Encryption
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Security of Ramp Schemes
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Simulatable certificateless two-party authenticated key agreement protocol
- Asymmetric Group Key Agreement
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Title not available (Why is that?)
- Efficient revocation and threshold pairing based cryptosystems
- Public Key Cryptography – PKC 2004
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- Certificateless threshold signature scheme from bilinear maps
- Ad-hoc threshold broadcast encryption with shorter ciphertexts
- Bridging broadcast encryption and group key agreement
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Efficient generic on-line/off-line (threshold) signatures without key exposure
Cited In (16)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- More constructions of re-splittable threshold public key encryption
- Practical (fully) distributed signatures provably secure in the standard model
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- A Generic Construction for Token-Controlled Public Key Encryption
- Efficient attribute-based proxy re-encryption with constant size ciphertexts
- Lattice-based identity-based resplittable threshold public key encryption scheme
- Dynamic threshold public-key encryption with decryption consistency from static assumptions
- Efficient threshold encryption from lossy trapdoor functions
- Provably secure three party encrypted key exchange scheme with explicit authentication
- Efficient dynamic threshold identity-based encryption with constant-size ciphertext
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Dynamic Threshold Public-Key Encryption
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
This page was built for publication: Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q456458)