Implementing secure reporting of sexual misconduct -- revisiting WhoToo
From MaRDI portal
Publication:2146102
DOI10.1007/978-3-030-88238-9_17zbMATH Open1489.91205OpenAlexW3204479398MaRDI QIDQ2146102FDOQ2146102
Authors: Alejandro Hevia, Ilana Mergudich-Thal
Publication date: 15 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88238-9_17
Recommendations
anonymitysecure multiparty computationefficient implementationsprivacy-preserving reporting of sexual misconduct
Cites Work
- How to share a secret
- Practical Identity-Based Encryption Without Random Oracles
- A public key cryptosystem and a signature scheme based on discrete logarithms
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Efficient signature generation by smart cards
- Title not available (Why is that?)
- Privacy-Preserving Set Operations
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Robust threshold DSS signatures
- Secure distributed key generation for discrete-log based cryptosystems
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- Public Key Cryptography - PKC 2005
- Title not available (Why is that?)
- Robust encryption
Cited In (2)
Uses Software
This page was built for publication: Implementing secure reporting of sexual misconduct -- revisiting WhoToo
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2146102)