Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311542
DOI10.1007/b99099zbMath1104.94042OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311542
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Related Items
Adaptively secure distributed PRFs from LWE ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model ⋮ Paillier-based publicly verifiable (non-interactive) secret sharing ⋮ Practical Threshold Signatures Without Random Oracles ⋮ Secure multiparty computation from threshold encryption based on class groups ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Efficient Simultaneous Broadcast ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings