Cryptography with weights: MPC, encryption and signatures
From MaRDI portal
Publication:6186595
Recommendations
Cites work
- scientific article; zbMATH DE number 176564 (Why is no real title available?)
- scientific article; zbMATH DE number 5263446 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- A full proof of the BGW protocol for perfectly secure multiparty computation
- A modular approach to key safeguarding
- An application of ramp schemes to broadcast encryption
- Better secret sharing via robust conditional disclosure of secrets
- Breaking the circuit-size barrier in secret sharing
- Chinese remaindering with errors
- Fluid MPC: secure multiparty computation with dynamic participants
- How to share a secret
- How to share a secret
- Monotone circuits for monotone weighted threshold functions
- Multilevel threshold secret sharing based on the Chinese remainder theorem
- On the Power of Nonlinear Secret-Sharing
- Order-C secure multiparty computation for highly repetitive circuits
- Ouroboros: a provably secure proof-of-stake blockchain protocol
- Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
- Progress in Cryptology - INDOCRYPT 2003
- Scalable Multiparty Computation with Nearly Optimal Work and Resilience
- Secret-sharing schemes for general and uniform access structures
- Security of Ramp Schemes
- Theory of Cryptography
- Unconditional communication-efficient MPC via Hall's marriage theorem
- Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
- Weighted threshold secret sharing schemes
- YOSO: You only speak once. Secure MPC with stateless ephemeral roles
Cited in
(3)
This page was built for publication: Cryptography with weights: MPC, encryption and signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186595)