SEARCH

SEARCH BY CITATION

References

  • 1
    Goldwasser S, Micali S. Probabilistic encryption. Journal of Computer and System Sciences 1984; 28(2):270299.
  • 2
    Bleichenbacher D. Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs #1. In CRYPTO, Lecture Notes in Computer Science, Vol. 1462, Krawczyk H (ed.). Springer, 1998; 112.
  • 3
    Shoup V. Why chosen ciphertext security matters, 1998. Available from: http://www.shoup.net/papers.
  • 4
    Manger J. A chosen ciphertext attack on rsa optimal asymmetric encryption padding (oaep) as standardized in pkcs #1 v2.0. Kilian [26]; 230238.
  • 5
    Dodis Y, Yung M. Exposure-resilience for free: The hierarchical id-based encryption case. In Proceedings of the First International IEEE Security in Storage Workshop. 2002; 4552.
  • 6
    Libert B, Quisquater JJ. Efficient revocation and threshold pairing based cryptosystems. Proceedings of the twenty-second annual symposium on Principles of distributed computing, PODC '03, 2003; 163171.
  • 7
    Boneh D, Franklin MK. Identity-based encryption from the weil pairing. Kilian [26]; 213229.
  • 8
    Baek J, Zheng Y. Identity-based threshold decryption. In Public Key Cryptography, Lecture Notes in Computer Science, Vol. 2947, Bao F, Deng RH, Zhou J (eds). Springer, 2004; 262276.
  • 9
    Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited. Journal of the ACM 2004; 51:557594.
  • 10
    Moriyama D, Okamoto T. An eck-secure authenticated key exchange protocol without random oracles. TIIS 2011; 5(3):607625.
  • 11
    Boneh D, Boyen X, Halevi S. Chosen ciphertext secure public key threshold encryption without random oracles. In CT-RSA, Lecture Notes in Computer Science, Vol. 3860, Pointcheval D (ed.). Springer, 2006; 226243.
  • 12
    Zhang L, Hu Y, Wu Q. Identity-based threshold broadcast encryption in the standard model. TIIS 2010; 4(3):400410.
  • 13
    Canetti R, Goldwasser S. An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. In EUROCRYPT. 1999; 90106.
  • 14
    Chai Z, Cao Z, Zhou Y. Efficient id-based broadcast threshold decryption in ad hoc network. In Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences—Volume 2 (IMSCCS'06). 2006; 148154.
  • 15
    Daza V, Herranz J, Morillo P, Ràfols C. Cca2-secure threshold broadcast encryption with shorter ciphertexts. In ProvSec, Lecture Notes in Computer Science, Vol. 4784, Susilo W, Liu JK, Mu Y (eds). Springer, 2007; 3550.
  • 16
    Delerablée C, Pointcheval D. Dynamic threshold public-key encryption. In CRYPTO, Lecture Notes in Computer Science, Vol. 5157, Wagner D (ed.). Springer, 2008; 317334.
  • 17
    Ghodosi H, Pieprzyk J, Safavi-naini R. Dynamic threshold cryptosystems: A new scheme in group oriented cryptography. In Proceedings of PRAGOCRYPT '96—International Conference on the Theory and Applications of Cryptology. 1996; 370379.
  • 18
    Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 2004; 33:167226.
  • 19
    Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity-based encryption. Cachin et al. [27]; 207222.
  • 20
    Canetti R, Halevi S, Katz J. A forward-secure public-key encryption scheme. In EUROCRYPT, Lecture Notes in Computer Science, Vol. 2656, Biham E (ed.). Springer, 2003; 255271.
  • 21
    Boneh D, Boyen X. Efficient selective-id secure identity-based encryption without random oracles. Cachin et al. [27]; 223238.
  • 22
    Park JH, Kim HJ, Sung M, Lee DH. Public key broadcast encryption schemes with shorter transmissions. Broadcasting, IEEE Transactions on sept 2008; 54(3):401411. doi:10.1109/TBC.2008.919940.
  • 23
    Boneh D, Boyen X, Goh EJ. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT, Lecture Notes in Computer Science, Vol. 3494, Cramer R (ed.). Springer, 2005; 440456.
  • 24
    Park JH, Lee DH. Fully collusion-resistant traitor tracing scheme with shorter ciphertexts. Designs, Codes and Cryptography 2011; 60(3):255276.
  • 25
    Boyen X. A tapestry of identity-based encryption: Practical frameworks compared. International Journal of Applied Cryptography 2008; 1(1):321.
  • 26
    Kilian J (ed.). Advances in Cryptology—CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19–23, 2001. Proceedings, Lecture Notes in Computer Science, Vol. 2139, Springer, 2001.
  • 27
    Cachin C, Camenisch J (eds). Advances in Cryptology—EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings, Lecture Notes in Computer Science, Vol. 3027, Springer, 2004.