scientific article
From MaRDI portal
Publication:4037497
zbMath0766.94014MaRDI QIDQ4037497
Publication date: 18 May 1993
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (51)
Threshold Schnorr with stateless deterministic signing from standard assumptions ⋮ A practical anonymous payment scheme for electronic commerce ⋮ FROST: Flexible round-optimized Schnorr threshold signatures ⋮ Structure-preserving signatures and commitments to group elements ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Weaknesses in Some Threshold Cryptosystems ⋮ On ASGS framework: general requirements and an example of implementation ⋮ Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols ⋮ On server trust in private proxy auctions ⋮ Absentia: secure multiparty computation on ethereum ⋮ Distributed certificateless key encapsulation mechanism secure against the adaptive adversary ⋮ Practical Threshold Signatures Without Random Oracles ⋮ How to verifiably encrypt many bits for an election? ⋮ Trust-Rated Authentication for Domain-Structured Distributed Systems ⋮ End-to-End Verifiable Quadratic Voting with Everlasting Privacy ⋮ Network-agnostic security comes (almost) for free in DKG and MPC ⋮ Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions ⋮ Practical Schnorr threshold signatures without the algebraic group model ⋮ Sharing a quantum secret without a trusted party ⋮ On the Amortized Communication Complexity of Byzantine Broadcast ⋮ Privacy Preserving Data Mining within Anonymous Credential Systems ⋮ Protocol completion incentive problems in cryptographic Vickrey auctions ⋮ Secure distributed constraint satisfaction: reaching agreement without revealing private information ⋮ Non-interactive identity-based threshold signature scheme without random oracles ⋮ Secure Authenticated Comparisons ⋮ Efficient generic on-line/off-line (threshold) signatures without key exposure ⋮ Threshold undeniable signature scheme based on conic ⋮ New secret sharing scheme based on linear code ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ A new threshold authenticated encryption scheme using labor-division signature ⋮ Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability ⋮ Strong \((n, t, n)\) verifiable secret sharing scheme ⋮ Online-Untransferable Signatures ⋮ An Efficient Protocol for Fair Secure Two-Party Computation ⋮ Threshold schemes from isogeny assumptions ⋮ Aggregatable distributed key generation ⋮ Designing a secure e-tender submission protocol ⋮ Fully Distributed Broadcast Encryption ⋮ Filling the gap between voters and cryptography in e-voting ⋮ Threshold verification scheme to a valid-signature using identity only on specialized approval ⋮ New efficient and secure protocols for verifiable signature sharing and other applications ⋮ Combiner Driven Management Models and Their Applications ⋮ A Tamper-Evident Voting Machine Resistant to Covert Channels ⋮ How to Challenge and Cast Your e-Vote ⋮ Robust threshold DSS signatures ⋮ Secure Node Discovery in Ad-hoc Networks and Applications ⋮ ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability ⋮ Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer ⋮ Privacy preserving link analysis on dynamic weighted graph ⋮ The design of a secure and fair sealed-bid auction service ⋮ \textsf{CSI-RAShi}: distributed key generation for CSIDH
This page was built for publication: