Extensions of access structures and their cryptographic applications
From MaRDI portal
Publication:989607
Recommendations
Cites work
- scientific article; zbMATH DE number 4123667 (Why is no real title available?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Characterizing Ideal Weighted Threshold Secret Sharing
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Dynamic Threshold Public-Key Encryption
- Fuzzy Identity-Based Encryption
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Hierarchical threshold secret sharing
- How to share a secret
- Identity-Based Encryption from the Weil Pairing
- Multipartite secret sharing by bivariate interpolation
- On Secret Sharing Schemes, Matroids and Polymatroids
- Secret sharing schemes with bipartite access structure
- Topics in Cryptology – CT-RSA 2006
Cited in
(4)
This page was built for publication: Extensions of access structures and their cryptographic applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q989607)