Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Signature Schemes for General Access Structures 2010-02-09 Paper Correction to “Secret Sharing Schemes With Bipartite Access Structure” 2008-12-21 Paper Progress...
    10 bytes (16 words) - 07:08, 7 October 2023
  • LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification 2021-10-06 Paper Access structure hiding secret...
    10 bytes (18 words) - 23:03, 24 September 2023
  • reconstruction 2021-03-31 Paper Realizing secret sharing with general access structure 2020-01-06 Paper An information theoretically secure e-lottery scheme...
    10 bytes (17 words) - 22:46, 10 December 2023
  • shift operation 2015-09-23 Paper Identity-based threshold decryption on access structure 2014-09-02 Paper Improved design of unimodular waveforms for MIMO radar...
    10 bytes (18 words) - 19:28, 11 December 2023
  • Publication Type FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure 2020-07-20 Paper...
    10 bytes (16 words) - 14:33, 6 October 2023
  • Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure 2014-09-29 Paper...
    10 bytes (16 words) - 15:09, 6 October 2023
  • Publication Date of Publication Type The complexity of the connected graph access structure on seven participants 2017-03-16 Paper...
    10 bytes (16 words) - 03:47, 7 October 2023
  • Publication Type A group oriented cryptosystem for the vector space access structure 2006-11-15 Paper...
    10 bytes (16 words) - 03:51, 7 October 2023
  • shift operation 2015-09-23 Paper Identity-based threshold decryption on access structure 2014-09-02 Paper...
    10 bytes (17 words) - 21:52, 9 December 2023
  • Date of Publication Type Finding the maximal adversary structure from any given access structure 2021-03-18 Paper https://portal.mardi4nfdi.de/entity/Q3180403...
    10 bytes (16 words) - 23:43, 24 September 2023
  • Publication Date of Publication Type An efficient threshold access-structure for RLWE-based multiparty homomorphic encryption 2023-04-13 Paper Efficient...
    10 bytes (16 words) - 01:16, 7 October 2023
  • Date of Publication Type Spatial encryption supporting non-monotone access structure 2014-09-04 Paper Revocable IBE Systems with Almost Constant-Size Key...
    10 bytes (16 words) - 07:08, 7 October 2023
  • Publication Type A group oriented cryptosystem for the vector space access structure 2006-11-15 Paper https://portal.mardi4nfdi.de/entity/Q4376292 1998-02-10...
    10 bytes (16 words) - 03:51, 7 October 2023
  • Publication Date of Publication Type An efficient threshold access-structure for RLWE-based multiparty homomorphic encryption 2023-04-13 Paper Global dynamic...
    10 bytes (16 words) - 23:05, 24 September 2023
  • $$MDS Codes 2021-12-08 Paper Linear secret sharing schemes with finer access structure 2021-08-31 Paper Secret sharing using near-MDS codes 2019-10-14 Paper...
    10 bytes (16 words) - 23:26, 24 September 2023
  • point functions 2022-06-29 Paper Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification...
    10 bytes (18 words) - 00:25, 25 September 2023
  • 2017-07-28 Paper The optimal linear secret sharing scheme for any given access structure 2014-03-18 Paper...
    10 bytes (16 words) - 11:28, 6 October 2023
  • 2020-07-30 Paper Efficient integer span program for hierarchical threshold access structure 2014-04-11 Paper...
    10 bytes (16 words) - 16:52, 6 October 2023
  • shift operation 2015-09-23 Paper Identity-based threshold decryption on access structure 2014-09-02 Paper Detect image splicing with artificial blurred boundary...
    10 bytes (17 words) - 21:52, 9 December 2023
  • Date of Publication Type Finding the maximal adversary structure from any given access structure 2021-03-18 Paper On random nonsingular Hermite normal form...
    10 bytes (16 words) - 01:01, 25 September 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)