VSS from distributed ZK proofs and applications
From MaRDI portal
Publication:6595689
DOI10.1007/978-981-99-8721-4_13zbMATH Open1546.94115MaRDI QIDQ6595689FDOQ6595689
Authors: Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Publication date: 30 August 2024
Recommendations
isogeniesverifiable secret sharingthreshold signaturesShamir secret sharingDKGZK proofs on secret shared data
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- How to share a secret
- The Arithmetic of Elliptic Curves
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure distributed key generation for discrete-log based cryptosystems
- Title not available (Why is that?)
- On zeros of a polynomial in a finite grid
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- CSIDH: an efficient post-quantum commutative group action
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- On the (in)security of ROS
- FROST: Flexible round-optimized Schnorr threshold signatures
- Computationally binding quantum commitments
- Post-quantum security of Fiat-Shamir
- Zero-knowledge proofs on secret-shared data via fully linear PCPs
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- Circuit amortization friendly encodingsand their application to statistically secure multiparty computation
- An isogeny-based ID protocol using structured public keys
- Practical non-interactive publicly verifiable secret sharing with thousands of parties
- SCALLOP: scaling the CSI-FiSh
- On actively secure fine-grained access structures from isogeny assumptions
- Practical robust DKG protocols for CSIDH
- CSI-SharK: CSI-FiSh with sharing-friendly keys
Cited In (2)
This page was built for publication: VSS from distributed ZK proofs and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6595689)