Threshold cryptosystems from threshold fully homomorphic encryption
From MaRDI portal
Publication:1673409
DOI10.1007/978-3-319-96884-1_19zbMATH Open1444.94047OpenAlexW2794501668MaRDI QIDQ1673409FDOQ1673409
Authors: Peng Zhang
Publication date: 12 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-96884-1_19
Recommendations
Cited In (45)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- Efficient, actively secure MPC with a dishonest majority: a survey
- Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model
- Fast two-party signature for upgrading ECDSA to two-party scenario easily
- On the round complexity of fully secure solitary MPC with honest majority
- Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption
- Two-round MPC: information-theoretic and black-box
- Adaptively secure distributed PRFs from LWE
- Simple threshold (fully homomorphic) encryption from LWE with polynomial modulus
- Succinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?
- Maliciously secure massively parallel computation for all-but-one corruptions
- How to recover a secret with \(O(n)\) additions
- Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN
- Efficient and universally composable single secret leader election from pairings
- Threshold ring signatures: new definitions and post-quantum security
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Threshold-optimal MPC with friends and foes
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
- Adaptively secure threshold symmetric-key encryption
- MuSig-L: lattice-based multi-signature with single-round online phase
- Twinkle: threshold signatures from DDH with full adaptive security
- Threshold raccoon: practical threshold signatures from standard lattice assumptions
- Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)
- Better than advertised security for non-interactive threshold signatures
- Combiners for functional encryption, unconditionally
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- BETA: biometric-enabled threshold authentication
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Multi-party threshold private set intersection with sublinear communication
- Robust Distributed Pseudorandom Functions for mNP Access Structures
- Provable security against decryption failure attacks from LWE
- Adaptively secure MPC with sublinear communication complexity
- \textit{Flood and submerse}: distributed key generation and robust threshold signature from lattices
- Adaptively secure 5 round threshold signatures from \textsf{MLWE}/\textsf{MSIS} and \textsf{DL} with rewinding
- Two-round threshold signature from algebraic one-more learning with errors
- Secure MPC: laziness leads to GOD
- Mixed-technique multi-party computations composed of two-party computations
- Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key
- Privacy-preserving mixed set operations
- SLAP: simpler, improved private stream aggregation from ring learning with errors
- An efficient threshold access-structure for RLWE-based multiparty homomorphic encryption
- Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
- Practical lattice-based distributed signatures for a small number of signers
- Threshold fully homomorphic encryption over the torus
This page was built for publication: Threshold cryptosystems from threshold fully homomorphic encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1673409)