scientific article; zbMATH DE number 2081074
From MaRDI portal
Publication:4474183
Recommendations
Cited in
(23)- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Adaptive cryptographic access control. Foreword by Sylvia L. Osborn
- Adaptively secure distributed PRFs from LWE
- Signcryption schemes with threshold unsigncryption, and applications
- scientific article; zbMATH DE number 5009201 (Why is no real title available?)
- scientific article; zbMATH DE number 5009202 (Why is no real title available?)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
- Advances in Cryptology – CRYPTO 2004
- Robust Threshold Schemes Based on the Chinese Remainder Theorem
- Simplified Submission of Inputs to Protocols
- Fully adaptive Schnorr threshold signatures
- Threshold cryptography based on Asmuth-Bloom secret sharing
- Adaptively secure non-interactive threshold cryptosystems
- Threshold structure-preserving signatures: strong and adaptive security under standard assumptions
- Twinkle: threshold signatures from DDH with full adaptive security
- Adaptively secure threshold signature scheme in the standard model
- Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
- Practical Threshold Signatures with Linear Secret Sharing Schemes
- Adaptively secure BLS threshold signatures from DDH and co-CDH
- An improved threshold homomorphic cryptosystem based on class groups
- Adaptive security of multi-party protocols, revisited
- Efficient and adaptive threshold signatures for ad hoc networks
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4474183)