Topics in Cryptology – CT-RSA 2006

From MaRDI portal
Publication:5898566

DOI10.1007/11605805zbMath1125.94012DBLPconf/ctrsa/2006OpenAlexW2564556261WikidataQ56921257 ScholiaQ56921257MaRDI QIDQ5898566

Shai Halevi, Xavier Boyen, Dan Boneh

Publication date: 12 February 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11605805




Related Items (31)

Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiabilityConstructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistencyGroup Signatures with Decentralized TracingGeneric Construction of Chosen Ciphertext Secure Proxy Re-EncryptionAdaptively secure threshold symmetric-key encryptionDynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsMulti-rate threshold FlipThemRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelThreshold public key encryption scheme resilient against continual leakage without random oraclesIdentity-based threshold decryption on access structureCCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsPractical Threshold Signatures Without Random OraclesTimed-release computational secret sharing and threshold encryptionEncapsulated search index: public-key, sub-linear, distributed, and delegatableEfficient dynamic threshold identity-based encryption with constant-size ciphertextEncryption to the future. A paradigm for sending secret messages to future (anonymous) committeesSigncryption schemes with threshold unsigncryption, and applicationsAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsEfficient identity-based threshold decryption scheme from bilinear pairingsSimplified Submission of Inputs to ProtocolsEfficient selective identity-based encryption without random oraclesAll-in-one group-oriented cryptosystem based on bilinear pairingAdaptively Secure Non-interactive Threshold CryptosystemsTag-KEM/DEM: A new framework for hybrid encryptionStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsFully Secure Threshold UnsigncryptionEfficient hybrid encryption from ID-based encryptionHomomorphic encryption systems statement: trends and challengesExtensions of access structures and their cryptographic applicationsNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsEfficient Threshold Encryption from Lossy Trapdoor Functions







This page was built for publication: Topics in Cryptology – CT-RSA 2006