Adaptively secure non-interactive threshold cryptosystems
نویسندگان
چکیده
منابع مشابه
Adaptively Secure Non-interactive Threshold Cryptosystems
Threshold cryptography aims at enhancing the availability and security of decryption and signature schemes by splitting private keys into several (say n) shares (typically, each of size comparable to the original secret key). In these schemes, a quorum of at least (t ≤ n) servers needs to act upon a message to produce the result (decrypted value or signature), while corrupting less than t serve...
متن کاملAdaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret data of alreadycorrupted parties. Ideally, an adaptively-secure encryption scheme should, like standard public-key encryption, allow arbitrarily-many parties to use a single encryption key to securely encrypt arbitra...
متن کاملNon-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
In threshold cryptography, private keys are divided into n shares, each one of which is given to a different server in order to avoid single points of failure. In the case of threshold public-key encryption, at least t ≤ n servers need to contribute to the decryption process. A threshold primitive is said robust if no coalition of t malicious servers can prevent remaining honest servers from su...
متن کاملThreshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is often dangerous to give to only one people the power of decryption. Therefore, threshold cryptosystems aimed at distributing the decryption ability. However, only two efficient such schemes have been proposed so far for achievin...
متن کاملNon-Interactive Forward-Secure Threshold Signature without Random Oracles
JIA YU, FAN-YU KONG, HUA-WEI ZHAO, XIANG-GUO CHENG, RONG HAO AND XIANG-FA GUO College of Information Engineering Qingdao University Qingdao, 266071 P.R. China Institute of Network Security Shandong University Jinan, 250100 P.R. China School of Computer and Information Engineering Shandong University of Finance Jinan, 250014 P.R. China Department of Computer Science National University of Singap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 2013
ISSN: 0304-3975
DOI: 10.1016/j.tcs.2013.01.001