Provably secure threshold public-key encryption with adaptive security and short ciphertexts
From MaRDI portal
Publication:456458
DOI10.1016/j.ins.2012.04.038zbMath1250.94042OpenAlexW1967316369WikidataQ120908110 ScholiaQ120908110MaRDI QIDQ456458
Lei Zhang, Josep Domingo-Ferrer, Bo Qin, Oriol Farràs, Qianhong Wu
Publication date: 25 October 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2012.04.038
Related Items
Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Efficient attribute-based proxy re-encryption with constant size ciphertexts ⋮ Efficient dynamic threshold identity-based encryption with constant-size ciphertext ⋮ Provably secure three party encrypted key exchange scheme with explicit authentication ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Practical (fully) distributed signatures provably secure in the standard model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Group-oriented setting's multisigncryption scheme with threshold designcryption
- Certificateless threshold signature scheme from bilinear maps
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- Efficient generic on-line/off-line (threshold) signatures without key exposure
- Simulatable certificateless two-party authenticated key agreement protocol
- Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts
- Efficient revocation and threshold pairing based cryptosystems
- Security of Ramp Schemes
- Adaptively Secure Non-interactive Threshold Cryptosystems
- How to share a secret
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Public Key Broadcast Encryption for Stateless Receivers
- Bridging Broadcast Encryption and Group Key Agreement
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Dynamic Threshold Public-Key Encryption
- Asymmetric Group Key Agreement
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Advances in Cryptology – CRYPTO 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Public Key Cryptography – PKC 2004
This page was built for publication: Provably secure threshold public-key encryption with adaptive security and short ciphertexts