scientific article; zbMATH DE number 1418290
From MaRDI portal
zbMATH Open0972.94031MaRDI QIDQ4941850FDOQ4941850
Authors: Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Publication date: 19 July 2000
Title of this publication is not available (Why is that?)
Recommendations
distributed key generationthreshold cryptographydiscrete-log based cryptosystemsthreshold RSAadaptive attackersadaptively-secure solutionsdistributed generation of DSS signaturesproactive schemes
Cited In (45)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- Provably secure threshold password-authenticated key exchange
- Adaptively secure distributed public-key systems.
- Threshold structure-preserving signatures
- Simplified Threshold RSA with Adaptive and Proactive Security
- Adaptive cryptographic access control. Foreword by Sylvia L. Osborn
- State machine replication under changing network conditions
- Signcryption schemes with threshold unsigncryption, and applications
- Adaptively secure distributed PRFs from LWE
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Leakproof secret sharing protocols with applications to group identification scheme
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
- Advances in Cryptology – CRYPTO 2004
- Practical Threshold Signatures Without Random Oracles
- Robust threshold DSS signatures
- Title not available (Why is that?)
- Optimal resilient threshold GQ signatures
- \textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generation
- Fully adaptive Schnorr threshold signatures
- Network-agnostic security comes (almost) for free in DKG and MPC
- Composition Implies Adaptive Security in Minicrypt
- Distributed certificateless key encapsulation mechanism secure against the adaptive adversary
- Adaptively secure non-interactive threshold cryptosystems
- Efficient oblivious transfer from lossy threshold homomorphic encryption
- Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
- Threshold structure-preserving signatures: strong and adaptive security under standard assumptions
- Adaptively Secure Two-Party Computation with Erasures
- Adaptively secure threshold symmetric-key encryption
- Twinkle: threshold signatures from DDH with full adaptive security
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Aggregatable distributed key generation
- Adaptively secure threshold signature scheme in the standard model
- Adaptively secure BLS threshold signatures from DDH and co-CDH
- Round-optimal, fully secure distributed key generation
- An improved threshold homomorphic cryptosystem based on class groups
- Communication-optimal proactive secret sharing for dynamic groups
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
- Adaptive Security of Constrained PRFs
- Efficient and adaptive threshold signatures for ad hoc networks
- Non-interactive identity-based threshold signature scheme without random oracles
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4941850)