Traceable secret sharing and applications
From MaRDI portal
Publication:2129017
Recommendations
Cites work
- scientific article; zbMATH DE number 1302868 (Why is no real title available?)
- scientific article; zbMATH DE number 1303119 (Why is no real title available?)
- scientific article; zbMATH DE number 1030976 (Why is no real title available?)
- scientific article; zbMATH DE number 2081065 (Why is no real title available?)
- scientific article; zbMATH DE number 1759344 (Why is no real title available?)
- scientific article; zbMATH DE number 1759787 (Why is no real title available?)
- scientific article; zbMATH DE number 2086724 (Why is no real title available?)
- scientific article; zbMATH DE number 1842485 (Why is no real title available?)
- scientific article; zbMATH DE number 1842486 (Why is no real title available?)
- scientific article; zbMATH DE number 1406785 (Why is no real title available?)
- scientific article; zbMATH DE number 1418304 (Why is no real title available?)
- scientific article; zbMATH DE number 1418305 (Why is no real title available?)
- Anonymous traitor tracing: how to embed arbitrary information in a key
- Asymmetric fingerprinting
- Collusion resistant traitor tracing from learning with errors
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- How to share a function securely
- How to share a secret
- Leakage resilient secret sharing and applications
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Optimal probabilistic fingerprint codes
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Public Traceability in Traitor Tracing Schemes
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
Cited in
(9)- Threshold signatures with private accountability
- Secure and traceable framework for data circulation
- Accountability for misbehavior in threshold decryption via threshold traitor tracing
- Traceable secret sharing: strong security and efficient constructions
- scientific article; zbMATH DE number 1676639 (Why is no real title available?)
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- scientific article; zbMATH DE number 1618051 (Why is no real title available?)
- Storing and retrieving secrets on a blockchain
- Efficient quantum multi-authority attribute-based encryption and generalizations
This page was built for publication: Traceable secret sharing and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129017)