Performing computations on hierarchically shared secrets
From MaRDI portal
Recommendations
Cited in
(6)- scientific article; zbMATH DE number 6671957 (Why is no real title available?)
- Secure computation with preprocessing via function secret sharing
- On actively secure fine-grained access structures from isogeny assumptions
- Automata, Languages and Programming
- Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
- Evolving homomorphic secret sharing for hierarchical access structures
This page was built for publication: Performing computations on hierarchically shared secrets
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1653229)