Login / Signup

Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.

Takeru IshiharaHiroshi AonoSadayuki HongoJunji Shikata
Published in: ACISP (2007)
Keyphrases