The following pages link to How to share a function securely (Q2817644):
Displaying 12 items.
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency (Q278732) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Efficient certificateless threshold signatures without random oracles (Q545431) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- Efficient dynamic threshold identity-based encryption with constant-size ciphertext (Q897859) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- Cutting-edge cryptography through the lens of secret sharing (Q1627968) (← links)
- Privacy-preserving outsourcing of image feature extraction in cloud computing (Q1701922) (← links)
- Efficient identity-based threshold decryption scheme from bilinear pairings (Q1712600) (← links)
- Aggregatable distributed key generation (Q2056680) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Leakage Resilient Cheating Detectable Secret Sharing Schemes (Q6488373) (← links)