collaborating with
t servers
adversary
While launching the CCA: the adversary has access to all the private data of collaborating servers
Say A Threshold Public Key Encryption Scheme is :
t-secure: a coalition of t curious but honest servers +
adversary cannot break it.
t-robust: a coalition of t faulty servers cannot
prevent user from decrypting (no denial of
service).
Previous slide | Next slide | Back to first slide | View graphic version |