Threshold and Revocation Cryptosystems via Extractable Hash Proofs
From MaRDI portal
Publication:3003404
DOI10.1007/978-3-642-20465-4_32zbMath1290.94137OpenAlexW1547258151MaRDI QIDQ3003404
Publication date: 27 May 2011
Published in: Advances in Cryptology – EUROCRYPT 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-20465-4_32
Related Items (6)
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Better than advertised security for non-interactive threshold signatures ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys
This page was built for publication: Threshold and Revocation Cryptosystems via Extractable Hash Proofs