Efficient dynamic threshold identity-based encryption with constant-size ciphertext
From MaRDI portal
Publication:897859
DOI10.1016/J.TCS.2015.09.006zbMATH Open1358.94078OpenAlexW1839513811WikidataQ121604726 ScholiaQ121604726MaRDI QIDQ897859FDOQ897859
Authors: Willy Susilo, Fuchun Guo, Yi Mu
Publication date: 8 December 2015
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2015.09.006
Recommendations
- Dynamic Threshold Public-Key Encryption
- ID-based threshold decryption secure against adaptive chosen-ciphertext attack
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
Cites Work
- Secure integration of asymmetric and symmetric encryption schemes
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- How to share a function securely
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Dynamic Threshold Public-Key Encryption
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Topics in Cryptology – CT-RSA 2006
- Efficient revocation and threshold pairing based cryptosystems
- Public Key Cryptography – PKC 2004
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Advances in cryptology - CRYPTO '89. Proceedings of a conference held at the University of California, Santa Barbara, CA (USA), August 20-24, 1989
Cited In (1)
This page was built for publication: Efficient dynamic threshold identity-based encryption with constant-size ciphertext
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q897859)