Publication:4536289

From MaRDI portal
Revision as of 10:54, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)


zbMath0999.94548MaRDI QIDQ4536289

Jacques Stern, Pierre-Alain Fouque, Guillaume Poupard

Publication date: 28 November 2002



91B12: Voting theory

94A60: Cryptography

94A62: Authentication, digital signatures and secret sharing


Related Items

Formal and Precise Analysis of Soundness of Several Shuffling Schemes, Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption, Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer, A new distribution version of Boneh-Goh-Nissim cryptosystem : Security and performance analysis, Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library, A Tamper-Evident Voting Machine Resistant to Covert Channels, Hiding the input-size in multi-party private set intersection, Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\), Paillier-based publicly verifiable (non-interactive) secret sharing, Efficient set operations in the presence of malicious adversaries, Resource fairness and composability of cryptographic protocols, Protecting the privacy of voters: new definitions of ballot secrecy for e-voting, Filling the gap between voters and cryptography in e-voting, Shared generation of pseudo-random functions, Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers, An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials, Threshold cryptography based on Asmuth-Bloom secret sharing, Efficient RSA key generation and threshold Paillier in the two-party setting, Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry, Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting, A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress), Asynchronous Multi-Party Computation with Quadratic Communication, Efficient Binary Conversion for Paillier Encrypted Values, Fair Threshold Decryption with Semi-Trusted Third Parties, Practical Threshold Signatures with Linear Secret Sharing Schemes