scientific article; zbMATH DE number 1302840

From MaRDI portal
Publication:4249323

zbMath0931.94037MaRDI QIDQ4249323

Tal Rabin

Publication date: 17 June 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting, Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares, Optimal resilient threshold GQ signatures, Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party, Threshold and multi-signature schemes from linear hash functions, Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key, An efficient publicly verifiable and proactive secret sharing scheme, Efficient RSA key generation and threshold Paillier in the two-party setting, Secure multiparty computation from threshold encryption based on class groups, Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions, Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, Simplified Threshold RSA with Adaptive and Proactive Security, Secure threshold multi authority attribute based encryption without a central authority, A new construction of threshold cryptosystems based on RSA, Efficient Simultaneous Broadcast, Communication-Optimal Proactive Secret Sharing for Dynamic Groups, Provably secure threshold password-authenticated key exchange, Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry, Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings, Virtual Smart Cards: How to Sign with a Password and a Server, Shared generation of pseudo-random functions, Secure distributed storage and retrieval, New efficient and secure protocols for verifiable signature sharing and other applications, Adaptively secure distributed public-key systems., Robust threshold DSS signatures, Efficient and Adaptive Threshold Signatures for Ad hoc networks, Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer