Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM

Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata. Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. In Josef Pieprzyk, Hossein Ghodosi, Ed Dawson, editors, Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings. Volume 4586 of Lecture Notes in Computer Science, pages 259-273, Springer, 2007. [doi]

Abstract

Abstract is missing.