@inproceedings{c49075109ac14cee956c8842d04d5926,
title = "Custodian-hiding verifiable encryption",
abstract = "In a verifiable encryption, an asymmetrically encrypted ciphertext can be publicly verified to be decipherable by a designated receiver while maintaining the semantic security of the message. In this paper, we introduce Custodian-Hiding Verifiable Encryption, where it can be publicly verified that there exists at least one custodian (user), out of a designated group of n custodians (users), who can decrypt the message, while the semantic security of the message and the anonymity of the actual decryptor are maintained. Our scheme is proven secure in the random oracle model. We also introduce two extensions to decryption by a subset of more than one user. {\textcopyright} Springer-Verlag Berlin Heidelberg 2004.",
keywords = "Anonymity, Publicly Verifiable, Verifiable Encryption",
author = "Liu, {Joseph K.} and Wei, {Victor K.} and Wong, {Duncan S.}",
year = "2005",
doi = "10.1007/978-3-540-31815-6_5",
language = "English",
isbn = "978-3-540-24015-0",
series = "Lecture Notes in Computer Science",
publisher = "Springer ",
pages = "51--64",
editor = "Lim, {Chae Hoon} and Moti Yung",
booktitle = "Information Security Applications",
note = "5th International Workshop on Information Security Applications (WISA 2004) ; Conference date: 23-08-2004 Through 25-08-2004",
}