Distributing any elliptic curve based protocol
From MaRDI portal
Publication:2177668
DOI10.1007/978-3-030-35199-1_17zbMATH Open1454.94099OpenAlexW2993523858MaRDI QIDQ2177668FDOQ2177668
Authors: N. P. Smart, Younes Talibi Alaoui
Publication date: 6 May 2020
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/645903
Recommendations
Cited In (8)
- Balancing privacy and accountability in blockchain identity management
- Multi-party revocation in sovrin: performance through distributed trust
- Non-interactive anonymous router with quasi-linear router computation
- Efficient secure two party ECDSA
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions
- Bandwidth-efficient threshold EC-DSA
- Spreading the privacy blanket: differentially oblivious shuffling for differential privacy
This page was built for publication: Distributing any elliptic curve based protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2177668)