2007
DOI: 10.1016/j.ins.2007.06.014
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless threshold cryptosystem secure against chosen-ciphertext attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2008
2008
2011
2011

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 31 publications
0
17
0
1
Order By: Relevance
“…The (decision) 4-BDH problem can be readily extended to (decision) ðk þ 1Þ-BDH problem (k P 2, see appendix for detail, or refer to [27]). Notice that the BDH problem is a special case of the ðk þ 1Þ-BDH problem with k ¼ 2.…”
Section: Complexity Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…The (decision) 4-BDH problem can be readily extended to (decision) ðk þ 1Þ-BDH problem (k P 2, see appendix for detail, or refer to [27]). Notice that the BDH problem is a special case of the ðk þ 1Þ-BDH problem with k ¼ 2.…”
Section: Complexity Assumptionsmentioning
confidence: 99%
“…Theorem 5.1 for Type II adversaries follows by Lemma 5.2. Especially, since we make use of decision 4-BDHP/ BDHP instead of 4-BDHP/BDHP directly, the security reduction is tighter than [27].…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Its goal is to remove the key escrow property from identity-based cryptography and has attracted a great extent of attention lately [24,18,43,4,19,23,16,27,36,35,33,15]. Certificateless cryptography not only eliminates the key escrow property, but also removes certificates.…”
Section: Introductionmentioning
confidence: 99%
“…The security of a public-key encryption scheme against adaptive chosen ciphertext attack (CCA2) was introduced by Rackoff and Simon [17] in 1991. Since then, this security notion is generally accepted as a right security for a public-key encryption scheme and many different kinds of public-key encryption schemes have been proposed [1,[4][5][6][7][8][9][10][11][12]14,15,23,25]. The first practical and provably secure public-key encryption scheme against CCA2 under the standard assumption without random oracles was proposed by Cramer and Shoup [10] in 1998.…”
Section: Introductionmentioning
confidence: 99%