2010
DOI: 10.1016/j.ins.2009.12.008
|View full text |Cite
|
Sign up to set email alerts
|

Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 33 publications
0
12
0
Order By: Relevance
“…After receiving the ciphertext sent to them, n players use the partial key and their secret key shares to recover the session key from the ciphertext. Compared to our previous work [6] , the adversary in the distributed certificateless key encapsulation mechanism can attack the system in two ways. The adversary can either replace the public key generated by n players or get the master key of the KGC.…”
Section: The Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…After receiving the ciphertext sent to them, n players use the partial key and their secret key shares to recover the session key from the ciphertext. Compared to our previous work [6] , the adversary in the distributed certificateless key encapsulation mechanism can attack the system in two ways. The adversary can either replace the public key generated by n players or get the master key of the KGC.…”
Section: The Modelmentioning
confidence: 99%
“…During the attack, the adversary can choose to corrupt up to t − 1 players at any time, based on the gathered information. The formal definition of the adversaries is similar to the adversary of the threshold scheme [6] except for a few modifications.…”
Section: The Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, the key escrow problem in ID-PKC is eliminated. Many certificateless cryptosystems have been proposed, including encryption schemes [1,10,24,25], signature schemes [1,11,28,29], key agreement protocols [1,31], threshold cryptosystems [8,14,23,26], and signcryption schemes [3,4,5,12,13,21,22]. As the adversary models in CLC are more complex, the security proofs in CLC are more challenging.…”
Section: Introductionmentioning
confidence: 99%