Public Key Cryptography - PKC 2006
From MaRDI portal
Publication:5898937
DOI10.1007/11745853zbMath1151.94501MaRDI QIDQ5898937
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11745853
Related Items
Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\), On actively secure fine-grained access structures from isogeny assumptions, An expressive and provably secure ciphertext-policy attribute-based encryption, Adaptively secure distributed PRFs from LWE, Adaptively secure distributed PRFs from \(\mathsf{LWE}\), Blackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemes, Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings, Practical (fully) distributed signatures provably secure in the standard model, Efficient integer span program for hierarchical threshold access structure, Efficient Secure Two-Party Exponentiation, Efficient, Robust and Constant-Round Distributed RSA Key Generation