Pages that link to "Item:Q3408195"
From MaRDI portal
The following pages link to Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems (Q3408195):
Displayed 20 items.
- Efficient lattice-based polynomial evaluation and batch ZK arguments (Q832321) (← links)
- Adaptively secure distributed PRFs from LWE (Q1631339) (← links)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\) (Q2043324) (← links)
- Revocable attribute-based proxy re-encryption (Q2048189) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Actively secure setup for SPDZ (Q2072211) (← links)
- Adaptively secure threshold symmetric-key encryption (Q2152046) (← links)
- An efficient threshold access-structure for RLWE-based multiparty homomorphic encryption (Q2697678) (← links)
- Lattice-based identity-based resplittable threshold public key encryption scheme (Q2804886) (← links)
- The Geometry of Lattice Cryptography (Q3092183) (← links)
- Efficient Threshold Encryption from Lossy Trapdoor Functions (Q3102790) (← links)
- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications (Q4916004) (← links)
- Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography (Q5041168) (← links)
- Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption (Q6041282) (← links)
- Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption (Q6085271) (← links)
- Verifiable decryption in the head (Q6108795) (← links)
- Mixed-technique multi-party computations composed of two-party computations (Q6109459) (← links)
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext (Q6123051) (← links)
- Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection (Q6132417) (← links)
- ParaDiSE: efficient threshold authenticated encryption in fully malicious model (Q6169456) (← links)