Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
- 20 November 2001
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 351-368
- https://doi.org/10.1007/3-540-45682-1_21
Abstract
No abstract availableKeywords
This publication has 35 references indexed in Scilit:
- Practical multi-candidate election systemPublished by Association for Computing Machinery (ACM) ,2001
- Identification Protocols Secure against Reset AttacksLecture Notes in Computer Science, 2001
- On Adaptive vs. Non-adaptive Security of Multiparty ProtocolsLecture Notes in Computer Science, 2001
- Public-Key Encryption in a Multi-user Setting: Security Proofs and ImprovementsLecture Notes in Computer Science, 2000
- Extended Notions of Security for Multicast Public Key CryptosystemsLecture Notes in Computer Science, 2000
- Relations among notions of security for public-key encryption schemesPublished by Springer Science and Business Media LLC ,1998
- Efficient generation of shared RSA keysLecture Notes in Computer Science, 1997
- Optimal asymmetric encryptionLecture Notes in Computer Science, 1995
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Non-interactive zero-knowledge and its applicationsPublished by Association for Computing Machinery (ACM) ,1988