scientific article

From MaRDI portal
Publication:3374910

zbMath1082.94522MaRDI QIDQ3374910

Stanislaw Jarecki, Anna Lysyanskaya

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (24)

SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsAdaptively secure distributed PRFs from LWEBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelOptimal resilient threshold GQ signaturesQuantum encryption with certified deletion, revisited: public key, attribute-based, and classical communicationFully adaptive Schnorr threshold signaturesPublicly-verifiable deletion via target-collapsing functionsSigncryption schemes with threshold unsigncryption, and applicationsAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsAdaptively Secure Non-interactive Threshold CryptosystemsEfficient one-sided adaptively secure computationFeasibility and Infeasibility of Adaptively Secure Fully Homomorphic EncryptionTag-KEM/DEM: A new framework for hybrid encryptionPractical public key encryption with selective opening security for receiversProvably secure threshold password-authenticated key exchangeGNUC: a new universal composability frameworkAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively Secure Two-Party Computation with ErasuresEfficient Oblivious Transfer from Lossy Threshold Homomorphic EncryptionThreshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet SecurityNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsMemory Erasability AmplificationAdaptively secure distributed public-key systems.




This page was built for publication: