On actively secure fine-grained access structures from isogeny assumptions
From MaRDI portal
Publication:6166994
DOI10.1007/978-3-031-17234-2_18zbMath1517.94075MaRDI QIDQ6166994
Publication date: 7 July 2023
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Related Items (1)
Cites Work
- Unnamed Item
- Performing computations on hierarchically shared secrets
- Threshold schemes from isogeny assumptions
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- Sharing the LUOV: threshold post-quantum signatures
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Publicly Verifiable Secret Sharing
- How to share a secret
- Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol
- Public Key Cryptography - PKC 2006
- Computer Aided Verification
- Theory of Cryptography
This page was built for publication: On actively secure fine-grained access structures from isogeny assumptions