Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Securing threshold cryptosystems against chosen ciphertext attack - MaRDI portal

Securing threshold cryptosystems against chosen ciphertext attack

From MaRDI portal
Publication:1601827

DOI10.1007/s00145-001-0020-9zbMath0997.94016OpenAlexW174706587WikidataQ121450489 ScholiaQ121450489MaRDI QIDQ1601827

Victor Shoup, Rosario Gennaro

Publication date: 27 June 2002

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-001-0020-9




Related Items (21)

Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistencyAdaptively secure threshold symmetric-key encryptionDynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionNew results and applications for multi-secret sharing schemesCCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsPractical Threshold Signatures Without Random OraclesImproved straight-line extraction in the random oracle model with applications to signature aggregationSigncryption schemes with threshold unsigncryption, and applicationsEfficient identity-based threshold decryption scheme from bilinear pairingsNew technique for chosen-ciphertext security based on non-interactive zero-knowledgePrivacy Preserving Data Mining within Anonymous Credential SystemsEfficient selective identity-based encryption without random oraclesZero-knowledge argument for simultaneous discrete logarithmsTag-KEM/DEM: A new framework for hybrid encryptionFully Secure Threshold UnsigncryptionFully secure ABE with outsourced decryption against chosen ciphertext attackNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsAd-Hoc Threshold Broadcast Encryption with Shorter CiphertextsCoin-based multi-party fair exchangeBlind Schnorr signatures and signed ElGamal encryption in the algebraic group model




This page was built for publication: Securing threshold cryptosystems against chosen ciphertext attack