Theory of Cryptography
From MaRDI portal
Publication:5711643
DOI10.1007/b106171zbMath1079.94545OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711643
Yevgeniy Dodis, Jonathan N. Katz
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b106171
Related Items (21)
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency ⋮ Short Integrated PKE+PEKS in Standard Model ⋮ FO-like combiners and hybrid post-quantum cryptography ⋮ An Efficient and Provably Secure Certificate-Based Encryption Scheme ⋮ Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions ⋮ Towards Certificate-Based Group Encryption ⋮ Timed-release computational secret sharing and threshold encryption ⋮ Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext ⋮ Error-Tolerant Combiners for Oblivious Primitives ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Efficient Certificate-Based Encryption in the Standard Model ⋮ Adaptively Secure Non-interactive Threshold Cryptosystems ⋮ Robust encryption ⋮ Post-challenge leakage in public-key encryption ⋮ Generic constructions of integrated PKE and PEKS ⋮ An Efficient Post-Quantum One-Time Signature Scheme ⋮ One-Time Signatures and Chameleon Hash Functions ⋮ Combiners for Chosen-Ciphertext Security ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Obfuscation Combiners ⋮ Efficient Threshold Encryption from Lossy Trapdoor Functions
This page was built for publication: Theory of Cryptography