The following pages link to Robust Threshold DSS Signatures (Q2876915):
Displaying 36 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Leakproof secret sharing protocols with applications to group identification scheme (Q439799) (← links)
- Certificateless threshold signature secure in the standard model (Q497178) (← links)
- Distributed ring signatures from general dual access structures (Q851736) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (Q955733) (← links)
- Secure distributed storage and retrieval (Q1575652) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- Shared generation of pseudo-random functions (Q1827581) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- Threshold ECDSA with an offline recovery party (Q2053769) (← links)
- Threshold schemes from isogeny assumptions (Q2055691) (← links)
- Bandwidth-efficient threshold EC-DSA (Q2055695) (← links)
- Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security (Q2098172) (← links)
- \textsf{CSI-RAShi}: distributed key generation for CSIDH (Q2118548) (← links)
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo (Q2146102) (← links)
- Efficient threshold-optimal ECDSA (Q2149818) (← links)
- Adaptively secure threshold symmetric-key encryption (Q2152046) (← links)
- Sharing DSS by the Chinese remainder theorem (Q2349622) (← links)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (Q2822671) (← links)
- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties (Q2947120) (← links)
- A threshold scheme under peer-to-peer network (Q3443286) (← links)
- Robust and Efficient Sharing of RSA Functions (Q3452349) (← links)
- Bit-Slice Auction Circuit (Q5030176) (← links)
- Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol (Q5041220) (← links)
- Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin (Q5854436) (← links)
- Fast secure two-party ECDSA signing (Q5918379) (← links)
- Provably unforgeable threshold EdDSA with an offline participant and trustless setup (Q6095326) (← links)
- TVES: threshold verifiably encrypted signature and its applications (Q6573646) (← links)
- Secure multi-party SM2 signature based on SPDZ protocol (Q6573655) (← links)
- Identity-based threshold signatures from isogenies (Q6595946) (← links)
- Cutting the GRASS: threshold group action signature schemes (Q6636123) (← links)
- Adaptively secure BLS threshold signatures from DDH and co-CDH (Q6653010) (← links)
- \textit{Flood and submerse}: distributed key generation and robust threshold signature from lattices (Q6653015) (← links)