scientific article; zbMATH DE number 1418290
From MaRDI portal
Publication:4941850
zbMath0972.94031MaRDI QIDQ4941850
Hugo Krawczyk, Rosario Gennaro, Ran Canetti, Stanislaw Jarecki, Tal Rabin
Publication date: 19 July 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
distributed key generationthreshold cryptographydiscrete-log based cryptosystemsthreshold RSAadaptive attackersadaptively-secure solutionsdistributed generation of DSS signaturesproactive schemes
Related Items (25)
Adaptively secure distributed PRFs from LWE ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Optimal resilient threshold GQ signatures ⋮ Distributed certificateless key encapsulation mechanism secure against the adaptive adversary ⋮ Practical Threshold Signatures Without Random Oracles ⋮ State machine replication under changing network conditions ⋮ \textsf{Bingo}: adaptivity and asynchrony in verifiable secret sharing and distributed key generation ⋮ Network-agnostic security comes (almost) for free in DKG and MPC ⋮ Fully adaptive Schnorr threshold signatures ⋮ Leakproof secret sharing protocols with applications to group identification scheme ⋮ Signcryption schemes with threshold unsigncryption, and applications ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Non-interactive identity-based threshold signature scheme without random oracles ⋮ Adaptively Secure Non-interactive Threshold Cryptosystems ⋮ Simplified Threshold RSA with Adaptive and Proactive Security ⋮ Communication-Optimal Proactive Secret Sharing for Dynamic Groups ⋮ Provably secure threshold password-authenticated key exchange ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Adaptively Secure Two-Party Computation with Erasures ⋮ Aggregatable distributed key generation ⋮ Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption ⋮ Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Adaptively secure distributed public-key systems. ⋮ Robust threshold DSS signatures
This page was built for publication: