Login / Signup
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.
Takeru Ishihara
Hiroshi Aono
Sadayuki Hongo
Junji Shikata
Published in:
ACISP (2007)
Keyphrases
</>
probabilistic model
mathematical model
probability distribution
computational model
security model
statistical model
cryptographic protocols
neural network
objective function
management system
lightweight
smart card
security properties