Pages that link to "Item:Q2876899"
From MaRDI portal
The following pages link to Publicly Verifiable Secret Sharing (Q2876899):
Displayed 46 items.
- Paillier-based publicly verifiable (non-interactive) secret sharing (Q398963) (← links)
- Efficient democratic group signatures with threshold traceability (Q407480) (← links)
- Leakproof secret sharing protocols with applications to group identification scheme (Q439799) (← links)
- A pairing-based publicly verifiable secret sharing scheme (Q545465) (← links)
- Efficient VSS free of computational assumption (Q663418) (← links)
- Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system (Q781154) (← links)
- An efficient multi-use multi-secret sharing scheme based on hash function (Q988708) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- Attacks to some verifiable multi-secret sharing schemes and two improved schemes (Q1750542) (← links)
- Zero-knowledge argument for simultaneous discrete logarithms (Q1759659) (← links)
- An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme (Q1774928) (← links)
- New multisignature scheme for specified group of verifiers (Q1881702) (← links)
- A novel ID-based group signature (Q1969685) (← links)
- A novel secret sharing scheme using multiple share images (Q2045443) (← links)
- Efficient compiler to covert security with public verifiability for honest majority MPC (Q2096640) (← links)
- Report and trace ring signatures (Q2149823) (← links)
- Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems (Q2160700) (← links)
- A non-interactive \((t, n)\)-publicly verifiable multi-secret sharing scheme (Q2161420) (← links)
- Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols (Q2170001) (← links)
- Practical non-interactive publicly verifiable secret sharing with thousands of parties (Q2170010) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Secure publicly verifiable and proactive secret sharing schemes with general access structure (Q2291769) (← links)
- Threshold changeable secret sharing with secure secret reconstruction (Q2296281) (← links)
- Counting fixed points and rooted closed walks of the singular map \(x \mapsto x^{x^n}\) modulo powers of a prime (Q2303901) (← links)
- Dynamic threshold secret reconstruction and its application to the threshold cryptography (Q2353654) (← links)
- Verifiable quantum \((k,n)\)-threshold secret key sharing (Q2429964) (← links)
- Secure distributed constraint satisfaction: reaching agreement without revealing private information (Q2457708) (← links)
- On ASGS framework: general requirements and an example of implementation (Q2644567) (← links)
- Cryptographic algorithms for privacy-preserving online applications (Q2668547) (← links)
- Public-key generation with verifiable randomness (Q2692338) (← links)
- Transformations of Cryptographic Schemes Through Interpolation Techniques (Q2790421) (← links)
- Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials (Q2829958) (← links)
- Encryption Switching Protocols (Q2835592) (← links)
- Publicly Verifiable Secret Sharing for Cloud-Based Key Management (Q3104748) (← links)
- An LWE-based verifiable threshold secret sharing scheme (Q3383067) (← links)
- Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability (Q3452236) (← links)
- Interpolation of the Double Discrete Logarithm (Q3519547) (← links)
- Public Verifiability from Pairings in Secret Sharing Schemes (Q3644208) (← links)
- Memory leakage-resilient secret sharing schemes (Q5046490) (← links)
- Group Encryption (Q5387099) (← links)
- An efficient publicly verifiable and proactive secret sharing scheme (Q6112179) (← links)
- YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model (Q6135416) (← links)
- Improving the efficiency of report and trace ring signatures (Q6155241) (← links)
- Building blocks of sharding blockchain systems: concepts, approaches, and open problems (Q6158770) (← links)
- On actively secure fine-grained access structures from isogeny assumptions (Q6166994) (← links)
- Network-agnostic security comes (almost) for free in DKG and MPC (Q6186588) (← links)