The following pages link to (Q3374910):
Displayed 24 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Efficient one-sided adaptively secure computation (Q514477) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- Adaptively secure distributed PRFs from LWE (Q1631339) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Practical public key encryption with selective opening security for receivers (Q2004703) (← links)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\) (Q2043324) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- Provably secure threshold password-authenticated key exchange (Q2507695) (← links)
- GNUC: a new universal composability framework (Q2516522) (← links)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (Q2822671) (← links)
- Memory Erasability Amplification (Q2827713) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Adaptively Secure Two-Party Computation with Erasures (Q3623039) (← links)
- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption (Q4915998) (← links)
- Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption (Q4975186) (← links)
- Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model (Q5087275) (← links)
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication (Q6157506) (← links)
- Fully adaptive Schnorr threshold signatures (Q6186608) (← links)
- Publicly-verifiable deletion via target-collapsing functions (Q6190132) (← links)