scientific article; zbMATH DE number 1031003

From MaRDI portal
Publication:4343446

zbMath0876.94029MaRDI QIDQ4343446

Hugo Krawczyk, Stanislaw Jarecki, Amir Herzberg, Mordechai M. Yung

Publication date: 6 July 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (40)

Fluid MPC: secure multiparty computation with dynamic participantsMagnifying computing gaps. Establishing encrypted communication over unidirectional channelsBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesOrthogonal matrix and its application in Bloom's threshold schemeImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsHow to Share a Secret, InfinitelyStoring and Retrieving Secrets on a BlockchainQuantum attribute-based encryption: a comprehensive studyDynamic and Verifiable Hierarchical Secret SharingUnconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and RobustnessPublic randomness extraction with ephemeral roles and worst-case corruptionsLe Mans: dynamic and fluid MPC for dishonest majorityQuantum-resistant password-based threshold single-sign-on authentication with updatable server private keyTimed-release computational secret sharing and threshold encryptionAn efficient publicly verifiable and proactive secret sharing schemeKDM security for the Fujisaki-Okamoto transformations in the QROMProactive quantum secret sharingState machine replication under changing network conditionsEfficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile AdversaryPerfect MPC over layered graphsLong term confidentiality: a surveyA verifiable threshold secret sharing scheme based on latticesCommunication-efficient proactive secret sharing for dynamic groups with dishonest majoritiesExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationPerennial secure multi-party computation of universal Turing machineSharing the quantum state and the classical information simultaneouslyA dynamic threshold commercial key escrow scheme based on conicSecure threshold multi authority attribute based encryption without a central authorityKey Management Based on Hierarchical Secret Sharing in Ad-Hoc NetworksCommunication-Optimal Proactive Secret Sharing for Dynamic GroupsProvably secure threshold password-authenticated key exchangeSecure publicly verifiable and proactive secret sharing schemes with general access structureЭллиптическая пороговая схема разделения секретаProvably-Secure Remote Memory Attestation for Heap Overflow ProtectionProactive Secret Sharing with a Dishonest MajoritySecure distributed storage and retrievalDistributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised NetworkCommunication-efficient proactive MPC for dynamic groups with dishonest majoritiesAdaptively secure distributed public-key systems.Robust threshold DSS signatures




This page was built for publication: