Securing threshold cryptosystems against chosen ciphertext attack

193Citations
Citations of this article
52Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack seems to be a requirement. However, there appear to be no practical threshold cryptosystems in the literature that are provably chosen-ciphertext secure, even in the idealized random hash function model. The contribution of this paper is to present two very practical threshold cryptosystems, and to prove that they are secure against chosen ciphertext attack in the random hash function model.

References Powered by Scopus

How to Share a Secret

11141Citations
781Readers

New Directions in Cryptography

10584Citations
1517Readers
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Shoup, V., & Gennaro, R. (1998). Securing threshold cryptosystems against chosen ciphertext attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1403, pp. 1–16). Springer Verlag. https://doi.org/10.1007/BFb0054113

Readers over time

‘09‘10‘11‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘23‘24036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 33

75%

Researcher 6

14%

Professor / Associate Prof. 4

9%

Lecturer / Post doc 1

2%

Readers' Discipline

Tooltip

Computer Science 36

88%

Engineering 2

5%

Mathematics 2

5%

Decision Sciences 1

2%

Article Metrics

Tooltip
Mentions
References: 2

Save time finding and organizing research with Mendeley

Sign up for free
0