TY - GEN
T1 - An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
AU - Canetti, Ran
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1999.
PY - 1999
Y1 - 1999
N2 - This paper proposes a simple threshold Public-Key Cryp- tosystem (PKC) which is secure against adaptive chosen ciphertext at- tack, under the Decisional Diffie-Hellman (DDH) intractability assumption. Previously, it was shown how to design non-interactive threshold PKC secure under chosen ciphertext attack, in the random-oracle model and under the DDH intractability assumption [25]. The random-oracle was used both in the proof of security and to eliminate interaction. General completeness results for multi-party computations [6,13] enable in principle converting any single server PKC secure against CCA (e.g., [19,17]) into a threshold one, but the conversions are inefficient and require much interaction among the servers for each ciphertext decrypted. The recent work by Cramer and Shoup [17] on single server PKC secure against adaptive CCA is the starting point for the new proposal.
AB - This paper proposes a simple threshold Public-Key Cryp- tosystem (PKC) which is secure against adaptive chosen ciphertext at- tack, under the Decisional Diffie-Hellman (DDH) intractability assumption. Previously, it was shown how to design non-interactive threshold PKC secure under chosen ciphertext attack, in the random-oracle model and under the DDH intractability assumption [25]. The random-oracle was used both in the proof of security and to eliminate interaction. General completeness results for multi-party computations [6,13] enable in principle converting any single server PKC secure against CCA (e.g., [19,17]) into a threshold one, but the conversions are inefficient and require much interaction among the servers for each ciphertext decrypted. The recent work by Cramer and Shoup [17] on single server PKC secure against adaptive CCA is the starting point for the new proposal.
UR - http://www.scopus.com/inward/record.url?scp=84957712291&partnerID=8YFLogxK
U2 - 10.1007/3-540-48910-X_7
DO - 10.1007/3-540-48910-X_7
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84957712291
SN - 3540658890
SN - 9783540658894
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 90
EP - 106
BT - Advances in Cryptology – EUROCRYPT 1999 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
A2 - Stern, Jacques
PB - Springer Verlag
T2 - 7th International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1999
Y2 - 2 May 1999 through 6 May 1999
ER -