Adaptively Secure Non-interactive Threshold Cryptosystems
From MaRDI portal
Publication:3012950
DOI10.1007/978-3-642-22012-8_47zbMath1334.94085OpenAlexW2128017619MaRDI QIDQ3012950
Benoît Libert, Mordechai M. Yung
Publication date: 7 July 2011
Published in: Automata, Languages and Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-22012-8_47
Related Items (7)
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions ⋮ Threshold public key encryption scheme resilient against continual leakage without random oracles ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
Cites Work
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Identity-Based Cryptosystems and Signature Schemes
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- The random oracle methodology, revisited
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Simplified Threshold RSA with Adaptive and Proactive Security
- Dynamic Threshold Public-Key Encryption
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- How to withstand mobile virus attacks (extended abstract)
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Theory of Cryptography
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2006
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Adaptively Secure Non-interactive Threshold Cryptosystems