Traceable secret sharing and applications
From MaRDI portal
Publication:2129017
DOI10.1007/978-3-030-84252-9_24zbMATH Open1487.94154OpenAlexW3176088383MaRDI QIDQ2129017FDOQ2129017
Vipul Goyal, Akshayaram Srinivasan, Yifan Song
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_24
Cites Work
- How to share a secret
- How to share a function securely
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Optimal probabilistic fingerprint codes
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Public Traceability in Traitor Tracing Schemes
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- Asymmetric Fingerprinting
- Collusion resistant traitor tracing from learning with errors
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (8)
- Storing and Retrieving Secrets on a Blockchain
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- Threshold signatures with private accountability
- Title not available (Why is that?)
- Efficient quantum multi-authority attribute-based encryption and generalizations
- Title not available (Why is that?)
- Accountability for misbehavior in threshold decryption via threshold traitor tracing
- Traceable secret sharing: strong security and efficient constructions
This page was built for publication: Traceable secret sharing and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129017)