User menu

Adaptively Secure Non-Interactive Threshold Cryptosystems

Bibliographic reference Libert, Benoît ; Yung, Moti. Adaptively Secure Non-Interactive Threshold Cryptosystems.38th International Colloquium on Automata, Languages and Programming (ICALP 2011) (Zürich (Suisse), du 04/07/2011 au 08/07/2011). In: Luca Aceto, Monika Henzinger, Jiri Sgall, International Colloquium on Automata, Languages and Programming (ICALP 2011), Springer : Germany2011, p. 588-600
Permanent URL http://hdl.handle.net/2078.1/91598
  1. Almansa Jesús F., Damgård Ivan, Nielsen Jesper Buus, Simplified Threshold RSA with Adaptive and Proactive Security, Advances in Cryptology - EUROCRYPT 2006 (2006) ISBN:9783540345466 p.593-611, 10.1007/11761679_35
  2. Bellare Mihir, Rogaway Phillip, Random oracles are practical : a paradigm for designing efficient protocols, 10.1145/168588.168596
  3. Boneh Dan, Boyen Xavier, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.223-238, 10.1007/978-3-540-24676-3_14
  4. Boneh Dan, Boyen Xavier, Halevi Shai, Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles, Topics in Cryptology – CT-RSA 2006 (2006) ISBN:9783540310334 p.226-243, 10.1007/11605805_15
  5. Boneh Dan, Franklin Matthew, Identity-Based Encryption from the Weil Pairing, 10.1137/s0097539701398521
  6. Boneh Dan, Franklin Matthew, Efficient generation of shared RSA keys, Advances in Cryptology — CRYPTO '97 (1997) ISBN:9783540633846 p.425-439, 10.1007/bfb0052253
  7. Boyd, C.: Digital Multisignatures. In: Beker, H.J., Piper, F.C. (eds.) Cryptography and Coding, pp. 241–246. Oxford University Press, Oxford (1989)
  8. Boyen Xavier, Mei Qixiang, Waters Brent, Direct chosen ciphertext security from identity-based techniques, 10.1145/1102120.1102162
  9. Canetti Ran, Goldreich Oded, Halevi Shai, The random oracle methodology, revisited, 10.1145/1008731.1008734
  10. Canetti Ran, Gennaro Rosario, Jarecki Stanisław, Krawczyk Hugo, Rabin Tal, Adaptive Security for Threshold Cryptosystems, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.98-116, 10.1007/3-540-48405-1_7
  11. Canetti Ran, Goldwasser Shafi, An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract), Advances in Cryptology — EUROCRYPT ’99 (1999) ISBN:9783540658894 p.90-106, 10.1007/3-540-48910-x_7
  12. Cramer Ronald, Shoup Victor, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Advances in Cryptology — CRYPTO '98 (1998) ISBN:9783540648925 p.13-25, 10.1007/bfb0055717
  13. Canetti Ran, Halevi Shai, Katz Jonathan, Chosen-Ciphertext Security from Identity-Based Encryption, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.207-222, 10.1007/978-3-540-24676-3_13
  14. Cramer Ronald, Damgård Ivan, Dziembowski Stefan, Hirt Martin, Rabin Tal, Efficient Multiparty Computations Secure Against an Adaptive Adversary, Advances in Cryptology — EUROCRYPT ’99 (1999) ISBN:9783540658894 p.311-326, 10.1007/3-540-48910-x_22
  15. Daza Vanesa, Herranz Javier, Morillo Paz, Ràfols Carla, CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, Provable Security ISBN:9783540756699 p.35-50, 10.1007/978-3-540-75670-5_3
  16. Delerablée Cécile, Pointcheval David, Dynamic Threshold Public-Key Encryption, Lecture Notes in Computer Science ISBN:9783540851738 p.317-334, 10.1007/978-3-540-85174-5_18
  17. Desmedt Yvo, Society and Group Oriented Cryptography: a New Concept, Advances in Cryptology — CRYPTO ’87 (1988) ISBN:9783540187967 p.120-127, 10.1007/3-540-48184-2_8
  18. Desmedt Yvo, Frankel Yair, Threshold cryptosystems, Advances in Cryptology — CRYPTO’ 89 Proceedings ISBN:9780387973173 p.307-315, 10.1007/0-387-34805-0_28
  19. Dodis Yevgeniy, Katz Jonathan, Chosen-Ciphertext Security of Multiple Encryption, Theory of Cryptography (2005) ISBN:9783540245735 p.188-209, 10.1007/978-3-540-30576-7_11
  20. ElGamal Taher, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, Advances in Cryptology ISBN:9783540156581 p.10-18, 10.1007/3-540-39568-7_2
  21. Goldwasser Shafi, Micali Silvio, Rivest Ronald L., A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, 10.1137/0217017
  22. Gennaro Rosario, Jarecki Stanisław, Krawczyk Hugo, Rabin Tal, Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Advances in Cryptology — EUROCRYPT ’99 (1999) ISBN:9783540658894 p.295-310, 10.1007/3-540-48910-x_21
  23. Fouque Pierre-Alain, Pointcheval David, Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks, Advances in Cryptology — ASIACRYPT 2001 (2001) ISBN:9783540429876 p.351-368, 10.1007/3-540-45682-1_21
  24. Frankel Yair, MacKenzie Philip, Yung Moti, Adaptively-Secure Distributed Public-Key Systems, Algorithms - ESA’ 99 (1999) ISBN:9783540662518 p.4-27, 10.1007/3-540-48481-7_2
  25. Frankel Yair, MacKenzie Philip, Yung Moti, Adaptively-Secure Optimal-Resilience Proactive RSA, Advances in Cryptology - ASIACRYPT’99 (1999) ISBN:9783540666660 p.180-194, 10.1007/978-3-540-48000-6_15
  26. Jarecki Stanisław, Lysyanskaya Anna, Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures, Advances in Cryptology — EUROCRYPT 2000 (2000) ISBN:9783540675174 p.221-242, 10.1007/3-540-45539-6_16
  27. Kiltz Eike, Chosen-Ciphertext Security from Tag-Based Encryption, Theory of Cryptography (2006) ISBN:9783540327318 p.581-600, 10.1007/11681878_30
  28. Lewko Allison, Okamoto Tatsuaki, Sahai Amit, Takashima Katsuyuki, Waters Brent, Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Advances in Cryptology – EUROCRYPT 2010 (2010) ISBN:9783642131899 p.62-91, 10.1007/978-3-642-13190-5_4
  29. Lewko Allison, Waters Brent, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Theory of Cryptography (2010) ISBN:9783642117985 p.455-479, 10.1007/978-3-642-11799-2_27
  30. Lysyanskaya Anna, Peikert Chris, Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes, Advances in Cryptology — ASIACRYPT 2001 (2001) ISBN:9783540429876 p.331-350, 10.1007/3-540-45682-1_20
  31. MacKenzie, P.: An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567. Springer, Heidelberg (2002)
  32. Ostrovsky, R., Yung, M.: How to Withstand Mobile Virus Attacks. In: 10th ACM Symp. on Principles of Distributed Computing, PODC 1991 (1991)
  33. Qin Bo, Wu Qianhong, Zhang Lei, Domingo-Ferrer Josep, Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts, Information and Communications Security (2010) ISBN:9783642176494 p.62-76, 10.1007/978-3-642-17650-0_6
  34. Shamir Adi, Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology ISBN:9783540156581 p.47-53, 10.1007/3-540-39568-7_5
  35. Shoup Victor, Gennaro Rosario, Securing threshold cryptosystems against chosen ciphertext attack, Lecture Notes in Computer Science (1998) ISBN:9783540645184 p.1-16, 10.1007/bfb0054113
  36. Shoup Victor, Practical Threshold Signatures, Advances in Cryptology — EUROCRYPT 2000 (2000) ISBN:9783540675174 p.207-220, 10.1007/3-540-45539-6_15
  37. Waters Brent, Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, Advances in Cryptology - CRYPTO 2009 (2009) ISBN:9783642033551 p.619-636, 10.1007/978-3-642-03356-8_36