The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption
暂无分享,去创建一个
Dong Hoon Lee | Hyoseung Kim | Young-Dong Son | Mi-Lyoung Kim | Hyoseung Kim | Milyoung Kim | Young-Dong Son
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Joonsang Baek,et al. Identity-Based Threshold Decryption , 2004, Public Key Cryptography.
[3] Dan Boneh,et al. Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles , 2006, CT-RSA.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[6] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[7] Jean-Jacques Quisquater,et al. Efficient revocation and threshold pairing based cryptosystems , 2003, PODC '03.
[8] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[9] Paz Morillo,et al. CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts , 2007, ProvSec.
[10] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[11] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[12] Ran Canetti,et al. An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack , 1999, EUROCRYPT.
[13] David Pointcheval,et al. Dynamic Threshold Public-Key Encryption , 2008, CRYPTO.