scientific article

From MaRDI portal
Revision as of 12:53, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3778674

zbMath0637.94013MaRDI QIDQ3778674

Josh Cohen Benaloh

Publication date: 1987


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (48)

Conducting secret ballot elections in computer networks: Problems and solutionsBest possible information-theoretic MPCTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelComputing in social networksHow to share a secret with cheatersAbelian sharing, common informations, and linear rank inequalitiesSumming over a network without revealing summandsA survey and refinement of repairable threshold schemesGraph coloring applied to secure computation in non-abelian groupsPrivate Visual Share-Homomorphic Computation and Randomness Reduction in Visual CryptographyPrivacy-preserving ridge regression on distributed dataAn Efficient and Provably Secure Private Polynomial Evaluation SchemeHomomorphic extensions of CRT-based secret sharingTight bounds on the randomness complexity of secure multiparty computationHomomorphic secret sharing for low degree polynomialsFoundations of Homomorphic Secret SharingA verifiable threshold secret sharing scheme based on latticesEvolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret SharingEfficient VSS free of computational assumptionDecentralized polling with respectable participantsMulti-party computation with conversion of secret sharingOn group-characterizability of homomorphic secret sharing schemesOn ideal homomorphic secret sharing schemes and their decompositionBenaloh’s Dense Probabilistic Encryption RevisitedComments on Harn-Lin's cheating detection schemeA communication-privacy tradeoff for modular additionA pairing-based publicly verifiable secret sharing schemeTightly coupled multi-group threshold secret sharing based on Chinese remainder theoremStrong \((n, t, n)\) verifiable secret sharing schemeEfficient and Decentralized Polling Protocol for General Social NetworksThreshold changeable secret sharing with secure secret reconstructionSecret sharing over infinite domainsTwo-operation homomorphic perfect sharing schemes over ringsSecure Bayesian model averaging for horizontally partitioned dataOn abelian and homomorphic secret sharing schemesThreshold schemes from isogeny assumptionsSecure computation with horizontally partitioned data using adaptive regression splinesPractical Fault-Tolerant Data AggregationPrivacy preserving region optimal algorithms for symmetric and asymmetric DCOPsIdeal homomorphic secret sharing schemes over cyclic groupsReversible data hiding based on Shamir's secret sharing for color images over cloudAccumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computationUnnamed ItemThe privacy of dense symmetric functionsAn information theoretically secure e-lottery scheme based on symmetric bivariate polynomialsGeneral Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-VotingDynamic threshold secret reconstruction and its application to the threshold cryptographyOn the structure of the privacy hierarchy




This page was built for publication: