STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
A new threshold scheme and its application in designing the conference key distribution cryptosystem
Information Processing Letters
A practical protocol for large group oriented networks
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Communications of the ACM
A high security log-in procedure
Communications of the ACM
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Conditionally secure secret sharing schemes with disenrollment capability
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Three Systems for Threshold Generation of Authenticators
Designs, Codes and Cryptography
A Self-Certified Group-Oriented Cryptosystem Without a Combiner
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Multi-party Optimistic Non-repudiation Protocol
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Two-Party Generation of DSA Signatures
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
All-in-one group-oriented cryptosystem based on bilinear pairing
Information Sciences: an International Journal
Dynamic and efficient joint encryption scheme in the plain public key model
Computers and Electrical Engineering
An efficient conic curve threshold digital signature
CISST'09 Proceedings of the 3rd WSEAS international conference on Circuits, systems, signal and telecommunications
A distributed E-business system based on conic curve
WSEAS Transactions on Computers
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A method for sending confidential messages to a group without trusted parties
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Crypto topics and applications II
Algorithms and theory of computation handbook
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
Research note: New generalized group-oriented cryptosystem based on Diffie-Hellman scheme
Computer Communications
Hi-index | 0.00 |
A practical non-interactive scheme is proposed to simultaneously solve several open problems in group oriented cryptography. The sender of the information is allowed to determine the encryption/decryption keys as well as the information destination without any coordination with the receiving group. The encrypted message is broadcasted to the receiving group and the receivers may authenticate themselves for legitimacy of the information directly from the ciphertext. The security of the scheme can be shown to be equivalent to the difficulty of solving the discrete logarithm problem.