An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

132 Scopus citations

Abstract

This paper proposes a simple threshold Public-Key Cryp- tosystem (PKC) which is secure against adaptive chosen ciphertext at- tack, under the Decisional Diffie-Hellman (DDH) intractability assumption. Previously, it was shown how to design non-interactive threshold PKC secure under chosen ciphertext attack, in the random-oracle model and under the DDH intractability assumption [25]. The random-oracle was used both in the proof of security and to eliminate interaction. General completeness results for multi-party computations [6,13] enable in principle converting any single server PKC secure against CCA (e.g., [19,17]) into a threshold one, but the conversions are inefficient and require much interaction among the servers for each ciphertext decrypted. The recent work by Cramer and Shoup [17] on single server PKC secure against adaptive CCA is the starting point for the new proposal.

Original languageEnglish
Title of host publicationAdvances in Cryptology – EUROCRYPT 1999 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsJacques Stern
PublisherSpringer Verlag
Pages90-106
Number of pages17
ISBN (Print)3540658890, 9783540658894
DOIs
StatePublished - 1999
Externally publishedYes
Event7th International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1999 - Prague, Czech Republic
Duration: 2 May 19996 May 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1592
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1999
Country/TerritoryCzech Republic
CityPrague
Period2/05/996/05/99

Fingerprint

Dive into the research topics of 'An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack'. Together they form a unique fingerprint.

Cite this