D Boneh, A Partap, L Rotem - Annual International Cryptology Conference, 2024 - Springer
A t-out-of-n threshold decryption system assigns key shares to n parties so that any t of them can decrypt a well-formed ciphertext. Existing threshold decryption systems are not secure …
In a traitor tracing system there are n parties and each party holds a secret key. A broadcaster uses an encryption key to encrypt a message m to a ciphertext c so that every …