On actively secure fine-grained access structures from isogeny assumptions
From MaRDI portal
Publication:6166994
Recommendations
- Threshold schemes from isogeny assumptions
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- New assumptions on isogenous pairing groups with applications to attribute-based encryption
- Access Structures of Elliptic Secret Sharing Schemes
Cites work
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- CSI-FiSh: efficient isogeny based signatures through class group computations
- He gives C-sieves on the CSIDH
- How to share a secret
- Performing computations on hierarchically shared secrets
- Public Key Cryptography - PKC 2006
- Publicly verifiable secret sharing
- Quantum security analysis of CSIDH
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Sharing the LUOV: threshold post-quantum signatures
- Theory of Cryptography
- Threshold schemes from isogeny assumptions
- Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
Cited in
(7)- Practical robust DKG protocols for CSIDH
- Threshold schemes from isogeny assumptions
- VSS from distributed ZK proofs and applications
- Cutting the GRASS: threshold group action signature schemes
- SCALLOP: scaling the CSI-FiSh
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- Round-robin is optimal: lower bounds for group action based protocols
This page was built for publication: On actively secure fine-grained access structures from isogeny assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6166994)