Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
Victor ShoupRosario GennaroPublished in: J. Cryptol. (2002)
Keyphrases
- chosen ciphertext
- signcryption scheme
- standard model
- secret key
- forward secure
- ciphertext
- signature scheme
- encryption scheme
- private key
- key distribution
- public key
- cryptographic protocols
- key management
- smart card
- security analysis
- bilinear pairings
- elliptic curve
- digital signature
- secure communication
- diffie hellman
- information security
- secret sharing scheme
- security model
- provably secure
- data sharing
- ring signature
- data integration