Verifiable secret sharing in a total of three rounds
From MaRDI portal
Publication:456152
DOI10.1016/J.IPL.2012.08.003zbMATH Open1250.94053OpenAlexW2015316544MaRDI QIDQ456152FDOQ456152
Authors: Shashank Agrawal
Publication date: 23 October 2012
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2012.08.003
Recommendations
Cites Work
- How to share a secret
- Reaching Agreement in the Presence of Faults
- A lower bound for the time to assure interactive consistency
- The Round Complexity of Verifiable Secret Sharing Revisited
- The round complexity of verifiable secret sharing and secure multicast
- Improving the round complexity of VSS in point-to-point networks
- Theory of Cryptography
Cited In (6)
This page was built for publication: Verifiable secret sharing in a total of three rounds
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q456152)