On sigma-protocols and (packed) black-box secret sharing schemes
From MaRDI portal
Publication:6635779
DOI10.1007/978-3-031-57722-2_14MaRDI QIDQ6635779FDOQ6635779
Authors: Claudia Bartoli, Ignacio Cascudo
Publication date: 12 November 2024
Cites Work
- Title not available (Why is that?)
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
- Title not available (Why is that?)
- Zero-knowledge proofs from secure multiparty computation
- On the amortized complexity of zero-knowledge protocols
- Improved efficiency of a linearly homomorphic cryptosystem
- Characterizing non-deterministic circuit size
- Unifying Zero-Knowledge Proofs of Knowledge
- Linearly homomorphic encryption from \(\mathsf {DDH}\)
- On the Amortized Complexity of Zero-Knowledge Protocols
- Practical fully secure unrestricted inner product functional encryption modulo \(p\)
- Blackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemes
- Bandwidth-efficient threshold EC-DSA
- Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)
- Compressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmics
- Two-party ECDSA from hash proof systems and efficient instantiations
- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
- Efficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois rings
- Linear Threshold Secret-Sharing with Binary Reconstruction
- Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)
- I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups
- Vector commitments over rings and compressed \(\varSigma \)-protocols
- Secure multiparty computation from threshold encryption based on class groups
- Sigma protocols from verifiable secret sharing and their applications
Cited In (2)
This page was built for publication: On sigma-protocols and (packed) black-box secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6635779)