Adaptively secure distributed public-key systems.
From MaRDI portal
Publication:1853497
DOI10.1016/S0304-3975(01)00260-2zbMath1061.94047OpenAlexW2032883792MaRDI QIDQ1853497
Yair Frankel, Philip D. MacKenzie, Mordechai M. Yung
Publication date: 21 January 2003
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0304-3975(01)00260-2
Cites Work
- Advances in Cryptology -- CRYPTO '97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17--21, 1997. Proceedings
- How to share a function securely
- Robust Threshold DSS Signatures
- How to share a secret
- Robust and Efficient Sharing of RSA Functions
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Securing threshold cryptosystems against chosen ciphertext attack
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- How to withstand mobile virus attacks (extended abstract)
- Maintaining authenticated communication in the presence of break-ins
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Adaptively secure distributed public-key systems.