A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
[chapter]
2000
Lecture Notes in Computer Science
We put forward two new measures of security for threshold schemes secure in the adaptive adversary model: security under concurrent composition; and security without the assumption of reliable erasure. Using novel constructions and analytical tools, in both these settings, we exhibit efficient secure threshold protocols for a variety of cryptographic applications. In particular, based on the recent scheme by Cramer-Shoup, we construct adaptively secure threshold cryptosystems secure against
doi:10.1007/3-540-45539-6_16
fatcat:jwsmbtqovzasrkj55szd4zr74i