scientific article; zbMATH DE number 1031003
From MaRDI portal
Publication:4343446
zbMath0876.94029MaRDI QIDQ4343446
Hugo Krawczyk, Stanislaw Jarecki, Amir Herzberg, Mordechai M. Yung
Publication date: 6 July 1997
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (40)
Fluid MPC: secure multiparty computation with dynamic participants ⋮ Magnifying computing gaps. Establishing encrypted communication over unidirectional channels ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Orthogonal matrix and its application in Bloom's threshold scheme ⋮ Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms ⋮ How to Share a Secret, Infinitely ⋮ Storing and Retrieving Secrets on a Blockchain ⋮ Quantum attribute-based encryption: a comprehensive study ⋮ Dynamic and Verifiable Hierarchical Secret Sharing ⋮ Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness ⋮ Public randomness extraction with ephemeral roles and worst-case corruptions ⋮ Le Mans: dynamic and fluid MPC for dishonest majority ⋮ Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key ⋮ Timed-release computational secret sharing and threshold encryption ⋮ An efficient publicly verifiable and proactive secret sharing scheme ⋮ KDM security for the Fujisaki-Okamoto transformations in the QROM ⋮ Proactive quantum secret sharing ⋮ State machine replication under changing network conditions ⋮ Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary ⋮ Perfect MPC over layered graphs ⋮ Long term confidentiality: a survey ⋮ A verifiable threshold secret sharing scheme based on lattices ⋮ Communication-efficient proactive secret sharing for dynamic groups with dishonest majorities ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Perennial secure multi-party computation of universal Turing machine ⋮ Sharing the quantum state and the classical information simultaneously ⋮ A dynamic threshold commercial key escrow scheme based on conic ⋮ Secure threshold multi authority attribute based encryption without a central authority ⋮ Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks ⋮ Communication-Optimal Proactive Secret Sharing for Dynamic Groups ⋮ Provably secure threshold password-authenticated key exchange ⋮ Secure publicly verifiable and proactive secret sharing schemes with general access structure ⋮ Эллиптическая пороговая схема разделения секрета ⋮ Provably-Secure Remote Memory Attestation for Heap Overflow Protection ⋮ Proactive Secret Sharing with a Dishonest Majority ⋮ Secure distributed storage and retrieval ⋮ Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network ⋮ Communication-efficient proactive MPC for dynamic groups with dishonest majorities ⋮ Adaptively secure distributed public-key systems. ⋮ Robust threshold DSS signatures
This page was built for publication: