Identity-Based Threshold Decryption
- 1 January 2004
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Efficient revocation and threshold pairing based cryptosystemsPublished by Association for Computing Machinery (ACM) ,2003
- Simple Identity-Based Cryptography with Mediated RSALecture Notes in Computer Science, 2003
- Hierarchical ID-Based CryptographyLecture Notes in Computer Science, 2002
- Threshold Cryptosystems Secure against Chosen-Ciphertext AttacksLecture Notes in Computer Science, 2001
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001
- Wallet Databases with ObserversPublished by Springer Science and Business Media LLC ,2001
- Secure Distributed Key Generation for Discrete-Log Based CryptosystemsLecture Notes in Computer Science, 1999
- Optimal asymmetric encryptionLecture Notes in Computer Science, 1995
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985