Distributing any elliptic curve based protocol
From MaRDI portal
Publication:2177668
Recommendations
Cited in
(8)- Balancing privacy and accountability in blockchain identity management
- Multi-party revocation in sovrin: performance through distributed trust
- Non-interactive anonymous router with quasi-linear router computation
- Efficient secure two party ECDSA
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions
- Bandwidth-efficient threshold EC-DSA
- Spreading the privacy blanket: differentially oblivious shuffling for differential privacy
This page was built for publication: Distributing any elliptic curve based protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2177668)