Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
From MaRDI portal
Publication:6123051
DOI10.1007/s10623-023-01309-2MaRDI QIDQ6123051
Keitaro Hashimoto, Kota Takahashi, Wakaha Ogata
Publication date: 4 March 2024
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
code-based cryptographythreshold public-key encryptionthreshold decryptionparallel encryptionclassic McEliece
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of error-correcting codes and error-detecting codes (94B99)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improved identification schemes based on error-correcting codes
- Secure integration of asymmetric and symmetric encryption schemes
- Tighter proofs of CCA security in the quantum random oracle model
- Wave: a new family of trapdoor one-way preimage sampleable functions based on codes
- Adding distributed decryption and key generation to a ring-LWE based CCA encryption scheme
- Code-based signatures from new proofs of knowledge for the syndrome decoding problem
- Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
- Modern Computer Algebra
- How to share a secret
- A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem
- Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
- Threshold Implementations Against Side-Channel Attacks and Glitches
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- The algebraic decoding of Goppa codes
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- A new identification scheme based on syndrome decoding
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Theory of Cryptography
- Theory of Cryptography
- Public Key Cryptography - PKC 2006
- Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption
- Syndrome decoding in the head: shorter signatures from zero-knowledge proofs
This page was built for publication: Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext