Securing threshold cryptosystems against chosen ciphertext attack
- 1 January 1998
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- More Flexible Exponentiation with PrecomputationPublished by Springer Nature ,2001
- Robust and Efficient Sharing of RSA FunctionsPublished by Springer Nature ,1996
- Cryptanalysis of the Immunized LL Public Key SystemsPublished by Springer Nature ,1995
- How to share a function securelyPublished by Association for Computing Machinery (ACM) ,1994
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Zero-knowledge proofs of knowledge without interactionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1992
- Noninteractive Zero-KnowledgeSIAM Journal on Computing, 1991
- Non-malleable cryptographyPublished by Association for Computing Machinery (ACM) ,1991
- Public-key cryptosystems provably secure against chosen ciphertext attacksPublished by Association for Computing Machinery (ACM) ,1990
- New directions in cryptographyIEEE Transactions on Information Theory, 1976