International audienceSemantic security against chosen-ciphertext attacks (IND-CCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is often dangerous to give to only one people the power of decryption. Therefore, threshold cryptosystems aimed at distributing the decryption ability. However, only two efficient such schemes have been proposed so far for achieving IND-CCA. Both are El Gamal-like schemes and thus are based on the same intractability assumption, namely the Decisional Diffie-Hellman problem. In this article we rehabilitate the twin-encryption paradigm proposed by Naor and Yung to present generic conversions from a large family of (threshold) IND-CPA scheme into a (threshol...
International audienceA threshold public key encryption protocol is a public key system where the pr...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
We consider threshold public-key encryption, where the decryption servers distributively hold the p...
We consider threshold public-key encryption, where the decryption servers distributively hold the pr...
International audienceWe consider threshold public-key encryption, where the decryption servers dist...
International audienceIn threshold cryptography, private keys are divided into n shares, each one of...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
Abstract. Chosen-Ciphertext (IND-CCA) security is generally consid-ered the right notion of security...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The pro...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
International audienceA threshold public key encryption protocol is a public key system where the pr...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
We consider threshold public-key encryption, where the decryption servers distributively hold the p...
We consider threshold public-key encryption, where the decryption servers distributively hold the pr...
International audienceWe consider threshold public-key encryption, where the decryption servers dist...
International audienceIn threshold cryptography, private keys are divided into n shares, each one of...
textabstractEvery public-key encryption scheme has to incorporate a certain amount of randomness int...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
Abstract. Chosen-Ciphertext (IND-CCA) security is generally consid-ered the right notion of security...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
International audienceIndistinguishability under chosen-ciphertext attack (IND-CCA) is now considere...
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The pro...
textabstractImagine many small devices send data to a single receiver, encrypted using the receiver'...
International audienceA threshold public key encryption protocol is a public key system where the pr...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
We consider threshold public-key encryption, where the decryption servers distributively hold the p...