The following pages link to How to share a function securely (Q2817644):
Displayed 15 items.
- Efficient certificateless threshold signatures without random oracles (Q545431) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- Secure distributed storage and retrieval (Q1575652) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- Shared generation of pseudo-random functions (Q1827581) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- Threshold cryptography based on Asmuth-Bloom secret sharing (Q2384533) (← links)
- Distributing the encryption and decryption of a block cipher (Q2572965) (← links)
- Efficient and Adaptive Threshold Signatures for Ad hoc networks (Q2864187) (← links)
- Robust Threshold Schemes Based on the Chinese Remainder Theorem (Q3506373) (← links)
- Simplified Threshold RSA with Adaptive and Proactive Security (Q3593121) (← links)
- Fair Threshold Decryption with Semi-Trusted Third Parties (Q3634502) (← links)
- Practical Threshold Signatures with Linear Secret Sharing Schemes (Q3637139) (← links)
- Threshold RSA for Dynamic and Ad-Hoc Groups (Q5458587) (← links)