Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structure-Preserving Signatures and Commitments to Group Elements / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simplified Threshold RSA with Adaptive and Proactive Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairing-Friendly Elliptic Curves of Prime Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomizable Proofs and Delegatable Anonymous Credentials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unrestricted Aggregate Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364568 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434890 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474196 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941850 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shorter IBE and Signatures via Asymmetric Pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536804 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-Authority Secret-Ballot Elections with Linear Work / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250770 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3149671 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient, Robust and Constant-Round Distributed RSA Key Generation / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a function securely / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474182 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542590 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4938769 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502497 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Threshold DSS Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust and Efficient Sharing of RSA Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250769 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418550 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure distributed key generation for discrete-log based cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-interactive Proof Systems for Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343446 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374910 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Cryptosystems Based on Factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively Secure Non-interactive Threshold Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linearly Homomorphic Structure-Preserving Signatures and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474183 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signatures Resilient to Continual Leakage on Memory and Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318686 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to withstand mobile virus attacks (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4037497 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249323 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374942 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5851072 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold and Revocation Cryptosystems via Extractable Hash Proofs / rank
 
Normal rank

Latest revision as of 12:40, 12 July 2024

scientific article
Language Label Description Also known as
English
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
scientific article

    Statements

    Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (English)
    0 references
    0 references
    0 references
    0 references
    31 August 2016
    0 references
    threshold signatures
    0 references
    fully distributed schemes
    0 references
    non-interactivity
    0 references
    adaptive security
    0 references
    efficiency
    0 references
    availability
    0 references
    fault tolerance
    0 references
    distributed key generation
    0 references
    erasure-freeness
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers