Team for Research in
Ubiquitous Secure Technology

• Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
D. Boneh, X. Boyen, S. Halevi

Citation
D. Boneh, X. Boyen, S. Halevi. "• Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.". RSA-CT, 226-243, 2006.

Abstract
We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our construction uses the recent identity based encryption system of Boneh and Boyen and the chosen ciphertext secure construction of Canetti, Halevi, and Katz.

Electronic downloads

Citation formats  
  • HTML
    D. Boneh, X. Boyen, S. Halevi. <a
    href="http://www.truststc.org/pubs/603.html"
    >•	Chosen Ciphertext Secure Public Key
    Threshold Encryption Without Random Oracles.</a>,
    RSA-CT, 226-243, 2006.
  • Plain text
    D. Boneh, X. Boyen, S. Halevi. "•	Chosen
    Ciphertext Secure Public Key Threshold Encryption Without
    Random Oracles.". RSA-CT, 226-243, 2006.
  • BibTeX
    @inproceedings{BonehBoyenHalevi06_ChosenCiphertextSecurePublicKeyThresholdEncryption,
        author = {D. Boneh and X. Boyen and S. Halevi},
        title = {•	Chosen Ciphertext Secure Public Key Threshold
                  Encryption Without Random Oracles.},
        booktitle = {RSA-CT},
        pages = {226-243},
        year = {2006},
        abstract = {We present a non-interactive chosen ciphertext
                  secure threshold encryption system. The proof of
                  security is set in the standard model and does not
                  use random oracles. Our construction uses the
                  recent identity based encryption system of Boneh
                  and Boyen and the chosen ciphertext secure
                  construction of Canetti, Halevi, and Katz. },
        URL = {http://www.truststc.org/pubs/603.html}
    }
    

Posted by Jessica Gamble on 16 Mar 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.