Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Selectively chosen ciphertext security in threshold public-key encryption

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Kitak-
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-04T03:27:49Z-
dc.date.available2021-09-04T03:27:49Z-
dc.date.created2021-06-18-
dc.date.issued2016-02-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/89653-
dc.description.abstractThreshold public-key encryption can control decryption abilities of an authorized user group in such a way that each user of the group can produce only a decryption share and at least t of them should collect decryption shares to recover a message. We present a new threshold public-key encryption that is secure against selectively chosen ciphertext attacks. Semantic security against chosen ciphertext adversaries is the de facto level of security for public-key encryption deployed in practice because many encryption systems are broken in a model of chosen ciphertext security. The security of the proposed system is formally proved without random oracles under a new assumption. We also provide proof of the intractability of our assumption in the generic group model. Copyright (c) 2012 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.subjectBROADCAST ENCRYPTION-
dc.titleSelectively chosen ciphertext security in threshold public-key encryption-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1002/sec.417-
dc.identifier.scopusid2-s2.0-84953752166-
dc.identifier.wosid000367999100001-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS, v.9, no.3, pp.189 - 200-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.citation.volume9-
dc.citation.number3-
dc.citation.startPage189-
dc.citation.endPage200-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusBROADCAST ENCRYPTION-
dc.subject.keywordAuthorthreshold public-key encryption-
dc.subject.keywordAuthorchosen ciphertext attacks-
dc.subject.keywordAuthorchosen plaintext attacks-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE