The following pages link to Robust Threshold DSS Signatures (Q2876915):
Displaying 26 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Leakproof secret sharing protocols with applications to group identification scheme (Q439799) (← links)
- Certificateless threshold signature secure in the standard model (Q497178) (← links)
- Distributed ring signatures from general dual access structures (Q851736) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (Q955733) (← links)
- Secure distributed storage and retrieval (Q1575652) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- Shared generation of pseudo-random functions (Q1827581) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- Threshold ECDSA with an offline recovery party (Q2053769) (← links)
- Threshold schemes from isogeny assumptions (Q2055691) (← links)
- Bandwidth-efficient threshold EC-DSA (Q2055695) (← links)
- Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security (Q2098172) (← links)
- \textsf{CSI-RAShi}: distributed key generation for CSIDH (Q2118548) (← links)
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo (Q2146102) (← links)
- Efficient threshold-optimal ECDSA (Q2149818) (← links)
- Adaptively secure threshold symmetric-key encryption (Q2152046) (← links)
- Sharing DSS by the Chinese remainder theorem (Q2349622) (← links)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (Q2822671) (← links)
- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties (Q2947120) (← links)
- A threshold scheme under peer-to-peer network (Q3443286) (← links)
- Robust and Efficient Sharing of RSA Functions (Q3452349) (← links)
- Provably unforgeable threshold EdDSA with an offline participant and trustless setup (Q6095326) (← links)