scientific article; zbMATH DE number 1759349
From MaRDI portal
Publication:4536289
zbMath0999.94548MaRDI QIDQ4536289
Jacques Stern, Pierre-Alain Fouque, Guillaume Poupard
Publication date: 28 November 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Voting theory (91B12) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Related Items (25)
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting ⋮ A new distribution version of Boneh-Goh-Nissim cryptosystem : Security and performance analysis ⋮ Protecting the privacy of voters: new definitions of ballot secrecy for e-voting ⋮ Threshold cryptography based on Asmuth-Bloom secret sharing ⋮ Paillier-based publicly verifiable (non-interactive) secret sharing ⋮ Hiding the input-size in multi-party private set intersection ⋮ A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress) ⋮ Efficient RSA key generation and threshold Paillier in the two-party setting ⋮ Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\) ⋮ Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers ⋮ Efficient set operations in the presence of malicious adversaries ⋮ Asynchronous Multi-Party Computation with Quadratic Communication ⋮ Resource fairness and composability of cryptographic protocols ⋮ Formal and Precise Analysis of Soundness of Several Shuffling Schemes ⋮ Efficient Binary Conversion for Paillier Encrypted Values ⋮ Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry ⋮ Fair Threshold Decryption with Semi-Trusted Third Parties ⋮ Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption ⋮ Practical Threshold Signatures with Linear Secret Sharing Schemes ⋮ Filling the gap between voters and cryptography in e-voting ⋮ Shared generation of pseudo-random functions ⋮ Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library ⋮ A Tamper-Evident Voting Machine Resistant to Covert Channels ⋮ An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials ⋮ Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
This page was built for publication: