CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
Yuanju GanLicheng WangJianhua YanYixian YangPublished in: J. Softw. (2013)
Keyphrases
- standard model
- cca secure
- chosen ciphertext
- signcryption scheme
- public key encryption scheme
- encryption scheme
- proxy re encryption
- diffie hellman assumption
- forward secure
- ciphertext
- cryptographic protocols
- identity based encryption
- provably secure
- diffie hellman
- public key cryptosystem
- signature scheme
- threshold signature scheme
- public key
- secret sharing scheme
- security analysis
- secret sharing
- hash functions
- database systems
- data sharing