The following pages link to (Q4037497):
Displaying 45 items.
- Structure-preserving signatures and commitments to group elements (Q290392) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Self-generated-certificate public key encryption without pairing and its application (Q545362) (← links)
- A new threshold authenticated encryption scheme using labor-division signature (Q545432) (← links)
- On server trust in private proxy auctions (Q608995) (← links)
- Distributed certificateless key encapsulation mechanism secure against the adaptive adversary (Q615208) (← links)
- Sharing a quantum secret without a trusted party (Q632212) (← links)
- Privacy preserving link analysis on dynamic weighted graph (Q812018) (← links)
- The design of a secure and fair sealed-bid auction service (Q814236) (← links)
- FROST: Flexible round-optimized Schnorr threshold signatures (Q832324) (← links)
- Protocol completion incentive problems in cryptographic Vickrey auctions (Q934962) (← links)
- Non-interactive identity-based threshold signature scheme without random oracles (Q943088) (← links)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (Q955733) (← links)
- Strong \((n, t, n)\) verifiable secret sharing scheme (Q991242) (← links)
- Designing a secure e-tender submission protocol (Q1020561) (← links)
- Filling the gap between voters and cryptography in e-voting (Q1028368) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- Threshold undeniable signature scheme based on conic (Q1763261) (← links)
- New secret sharing scheme based on linear code (Q1764386) (← links)
- Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability (Q1774853) (← links)
- Threshold verification scheme to a valid-signature using identity only on specialized approval (Q1826788) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- A practical anonymous payment scheme for electronic commerce (Q1876490) (← links)
- Threshold schemes from isogeny assumptions (Q2055691) (← links)
- Aggregatable distributed key generation (Q2056680) (← links)
- ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability (Q2104418) (← links)
- \textsf{CSI-RAShi}: distributed key generation for CSIDH (Q2118548) (← links)
- Threshold Schnorr with stateless deterministic signing from standard assumptions (Q2120070) (← links)
- Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols (Q2170001) (← links)
- Secure distributed constraint satisfaction: reaching agreement without revealing private information (Q2457708) (← links)
- On ASGS framework: general requirements and an example of implementation (Q2644567) (← links)
- Absentia: secure multiparty computation on ethereum (Q2670861) (← links)
- Secure Node Discovery in Ad-hoc Networks and Applications (Q2864180) (← links)
- Secure Authenticated Comparisons (Q3011317) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- Weaknesses in Some Threshold Cryptosystems (Q3452341) (← links)
- Practical Threshold Signatures Without Random Oracles (Q3503882) (← links)
- Trust-Rated Authentication for Domain-Structured Distributed Systems (Q3506351) (← links)
- Privacy Preserving Data Mining within Anonymous Credential Systems (Q3540036) (← links)
- Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer (Q5025956) (← links)
- Online-Untransferable Signatures (Q5445457) (← links)
- An Efficient Protocol for Fair Secure Two-Party Computation (Q5458934) (← links)
- Combiner Driven Management Models and Their Applications (Q5504556) (← links)
- A Tamper-Evident Voting Machine Resistant to Covert Channels (Q5505481) (← links)
- How to Challenge and Cast Your e-Vote (Q5857773) (← links)