Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
- 1 January 2006
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 226-243
- https://doi.org/10.1007/11605805_15
Abstract
No abstract availableKeywords
This publication has 30 references indexed in Scilit:
- Direct chosen ciphertext security from identity-based techniquesPublished by Association for Computing Machinery (ACM) ,2005
- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based EncryptionLecture Notes in Computer Science, 2005
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Short Signatures Without Random OraclesLecture Notes in Computer Science, 2004
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext AttackSIAM Journal on Computing, 2003
- On the Security of Joint Signature and EncryptionLecture Notes in Computer Science, 2002
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001
- Robust Distributed Multiplication without InteractionLecture Notes in Computer Science, 1999
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)Lecture Notes in Computer Science, 1999