scientific article

From MaRDI portal
Revision as of 03:01, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4037497

zbMath0766.94014MaRDI QIDQ4037497

Torben P. Pedersen

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (51)

Threshold Schnorr with stateless deterministic signing from standard assumptionsA practical anonymous payment scheme for electronic commerceFROST: Flexible round-optimized Schnorr threshold signaturesStructure-preserving signatures and commitments to group elementsBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesWeaknesses in Some Threshold CryptosystemsOn ASGS framework: general requirements and an example of implementationGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsOn server trust in private proxy auctionsAbsentia: secure multiparty computation on ethereumDistributed certificateless key encapsulation mechanism secure against the adaptive adversaryPractical Threshold Signatures Without Random OraclesHow to verifiably encrypt many bits for an election?Trust-Rated Authentication for Domain-Structured Distributed SystemsEnd-to-End Verifiable Quadratic Voting with Everlasting PrivacyNetwork-agnostic security comes (almost) for free in DKG and MPCTwo-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functionsPractical Schnorr threshold signatures without the algebraic group modelSharing a quantum secret without a trusted partyOn the Amortized Communication Complexity of Byzantine BroadcastPrivacy Preserving Data Mining within Anonymous Credential SystemsProtocol completion incentive problems in cryptographic Vickrey auctionsSecure distributed constraint satisfaction: reaching agreement without revealing private informationNon-interactive identity-based threshold signature scheme without random oraclesSecure Authenticated ComparisonsEfficient generic on-line/off-line (threshold) signatures without key exposureThreshold undeniable signature scheme based on conicNew secret sharing scheme based on linear codeSelf-generated-certificate public key encryption without pairing and its applicationA new threshold authenticated encryption scheme using labor-division signatureSelf-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceabilityStrong \((n, t, n)\) verifiable secret sharing schemeOnline-Untransferable SignaturesAn Efficient Protocol for Fair Secure Two-Party ComputationThreshold schemes from isogeny assumptionsAggregatable distributed key generationDesigning a secure e-tender submission protocolFully Distributed Broadcast EncryptionFilling the gap between voters and cryptography in e-votingThreshold verification scheme to a valid-signature using identity only on specialized approvalNew efficient and secure protocols for verifiable signature sharing and other applicationsCombiner Driven Management Models and Their ApplicationsA Tamper-Evident Voting Machine Resistant to Covert ChannelsHow to Challenge and Cast Your e-VoteRobust threshold DSS signaturesSecure Node Discovery in Ad-hoc Networks and ApplicationsATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availabilityHierarchical and dynamic threshold Paillier cryptosystem without trusted dealerPrivacy preserving link analysis on dynamic weighted graphThe design of a secure and fair sealed-bid auction service\textsf{CSI-RAShi}: distributed key generation for CSIDH







This page was built for publication: