How to share a function securely

From MaRDI portal
Publication:2817644

DOI10.1145/195058.195405zbMath1345.94094OpenAlexW2009432965MaRDI QIDQ2817644

Alfredo De Santis, Yair Frankel, Mordechai M. Yung, Yvo G. Desmedt

Publication date: 1 September 2016

Published in: Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/195058.195405




Related Items

Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistencyTraceable secret sharing and applicationsCutting-edge cryptography through the lens of secret sharingBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesRobust and Efficient Sharing of RSA FunctionsFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsThreshold cryptography based on Asmuth-Bloom secret sharingAdaptively secure threshold symmetric-key encryptionDynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsOn characterizations of escrow encryption schemesOptimal resilient threshold GQ signaturesThreshold and multi-signature schemes from linear hash functionsShort leakage resilient and non-malleable secret sharing schemesRobust Threshold Schemes Based on the Chinese Remainder TheoremEfficient dynamic threshold identity-based encryption with constant-size ciphertextBetter than advertised security for non-interactive threshold signaturesNew bounds on the local leakage resilience of Shamir's secret sharing schemePractical Schnorr threshold signatures without the algebraic group modelPrivacy-preserving outsourcing of image feature extraction in cloud computingEfficient identity-based threshold decryption scheme from bilinear pairingsDistributed Pseudorandom Functions for General Access Structures in NPEvolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret SharingExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationEfficient certificateless threshold signatures without random oraclesSimplified Threshold RSA with Adaptive and Proactive SecurityCutting-Edge Cryptography Through the Lens of Secret SharingThreshold RSA for Dynamic and Ad-Hoc GroupsProvably Secure Threshold Paillier Encryption Based on Hyperplane GeometryFair Threshold Decryption with Semi-Trusted Third PartiesAggregatable distributed key generationPractical Threshold Signatures with Linear Secret Sharing SchemesNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsShared generation of pseudo-random functionsSecure distributed storage and retrievalNew efficient and secure protocols for verifiable signature sharing and other applicationsDistributing the encryption and decryption of a block cipherAdaptively secure distributed public-key systems.Robust threshold DSS signaturesEfficient and Adaptive Threshold Signatures for Ad hoc networksNearly optimal robust secret sharing against rushing adversariesSharing DSS by the Chinese remainder theoremDynamic threshold secret reconstruction and its application to the threshold cryptography




This page was built for publication: How to share a function securely