@inproceedings{e1edfe60201a4641a1141c9136270426,
title = "Universal custodian-hiding verifiable encryption for discrete logarithms",
abstract = "We introduce the notion of Universal Custodian-Hiding Verifiable Encryption (UCH-VE) and propose a scheme of this type for discrete logarithms. A UCH-VE scheme allows an encryptor to designate t out of a group of n users and prepare a publicly verifiable ciphertext in such a way that any k of these t designated users can recover the message. The values of k and t are set arbitrarily by the encryptor. The anonymity of these t designated users will also be preserved. The UCH-VE scheme captures the notions of various types of verifiable encryption schemes that include conventional one-decryptor type, conventional threshold type, designated-1-out-of-n custodian-hiding type and designated group custodian-hiding type. On efficiency, the new scheme avoids using inefficient cut-and-choose proofs and compares favourably with the state-of-the-art verifiable encryption schemes for discrete logarithms. {\textcopyright} Springer-Verlag Berlin Heidelberg 2006.",
author = "Liu, {Joseph K.} and Tsang, {Patrick P.} and Wong, {Duncan S.} and Zhu, {Robert W.}",
year = "2006",
language = "English",
isbn = "3540333541",
volume = "3935 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "389--409",
booktitle = "Information Security and Cryptology, ICISC 2005",
address = "Germany",
note = "8th International Conference on Information Security and Cryptology, ICISC 2005 ; Conference date: 01-12-2005 Through 02-12-2005",
}