Return to Article Details Data Security Analysis Against Chosen Ciphertext Secure Public Key Attack Using Threshold Encryption Scheme Download Download PDF