Securing threshold cryptosystems against chosen ciphertext attack
From MaRDI portal
Recommendations
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- scientific article; zbMATH DE number 1023994
- scientific article; zbMATH DE number 2081075
- Topics in Cryptology – CT-RSA 2006
Cited in
(31)- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- Practical Threshold Signatures Without Random Oracles
- Tag-KEM/DEM: A new framework for hybrid encryption
- Signcryption schemes with threshold unsigncryption, and applications
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Privacy Preserving Data Mining within Anonymous Credential Systems
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
- Improved straight-line extraction in the random oracle model with applications to signature aggregation
- Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption
- Threshold encryption with silent setup
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
- Coin-based multi-party fair exchange
- Fully secure ABE with outsourced decryption against chosen ciphertext attack
- Fully secure threshold unsigncryption
- New results and applications for multi-secret sharing schemes
- Detecting causality in the presence of Byzantine processes: the case of synchronous systems
- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
- Adaptively secure threshold symmetric-key encryption
- Adaptive chosen ciphertext secure threshold key escrow scheme from pairing
- The Security of Ciphertext Stealing
- Efficient identity-based threshold decryption scheme from bilinear pairings
- Zero-knowledge argument for simultaneous discrete logarithms
- Dynamic threshold public-key encryption with decryption consistency from static assumptions
- Ad-hoc threshold broadcast encryption with shorter ciphertexts
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- scientific article; zbMATH DE number 2081075 (Why is no real title available?)
- Efficient selective identity-based encryption without random oracles
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- Practical traceable receipt-free encryption
- A verifiable multi-secret sharing scheme based on \(\ell\)-intersection pair of cyclic codes
This page was built for publication: Securing threshold cryptosystems against chosen ciphertext attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1601827)