Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
From MaRDI portal
Publication:278732
DOI10.1016/J.TCS.2016.04.003zbMath1403.94077OpenAlexW2325820237WikidataQ120813923 ScholiaQ120813923MaRDI QIDQ278732
Kazuo Ohta, Yusuke Sakai, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka
Publication date: 2 May 2016
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2016.04.003
decryption consistencypublic-key encryption with non-interactive openingthreshold public-key encryptionverifiable secret sharing
Cites Work
- Unnamed Item
- Multiple assignment scheme for sharing secret
- Securing threshold cryptosystems against chosen ciphertext attack
- How to share a function securely
- Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
- Adaptively Secure Non-interactive Threshold Cryptosystems
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Computational Verifiable Secret Sharing Revisited
- Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
- Dynamic Threshold Public-Key Encryption
- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Public-Key Encryption with Non-interactive Opening
- Theory of Cryptography
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2006
- Theory of Cryptography
This page was built for publication: Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency