Theory of Cryptography
From MaRDI portal
Publication:5711643
Recommendations
Cited in
(34)- Ciphertext Policy Multi-dimensional Range Encryption
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- The Multi-user Security of Double Encryption
- Chosen-Ciphertext Secure RSA-Type Cryptosystems
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
- Efficient Certificate-Based Encryption in the Standard Model
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Robust encryption
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Security of Sequential Multiple Encryption
- Combiners for chosen-ciphertext security
- Towards certificate-based group encryption
- Short Integrated PKE+PEKS in Standard Model
- scientific article; zbMATH DE number 1440054 (Why is no real title available?)
- FO-like combiners and hybrid post-quantum cryptography
- Post-challenge leakage in public-key encryption
- Topics in Cryptology – CT-RSA 2005
- An efficient post-quantum one-time signature scheme
- Dynamic threshold public-key encryption with decryption consistency from static assumptions
- Efficient threshold encryption from lossy trapdoor functions
- Adaptively secure non-interactive threshold cryptosystems
- Generic constructions of integrated PKE and PEKS
- One-time signatures and chameleon hash functions
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Obfuscation combiners
- Error-Tolerant Combiners for Oblivious Primitives
- Multiple encryption with minimum key
- Public Key Cryptography – PKC 2004
- Timed-release computational secret sharing and threshold encryption
- Amplification of Chosen-Ciphertext Security
- Threshold encryption into multiple ciphertexts
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
- An efficient and provably secure certificate-based encryption scheme
- Two phases encryption and its applications
This page was built for publication: Theory of Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5711643)