Securing threshold cryptosystems against chosen ciphertext attack

187Citations
Citations of this article
51Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack seems to be a requirement. However, there appear to be no practical threshold cryptosystems in the literature that are provably chosen-ciphertext secure, even in the idealized random hash function model. The contribution of this paper is to present two very practical threshold cryptosystems, and to prove that they are secure against chosen ciphertext attack in the random hash function model.

Cite

CITATION STYLE

APA

Shoup, V., & Gennaro, R. (1998). Securing threshold cryptosystems against chosen ciphertext attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1403, pp. 1–16). Springer Verlag. https://doi.org/10.1007/BFb0054113

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free