The following pages link to (Q4343446):
Displaying 34 items.
- Magnifying computing gaps. Establishing encrypted communication over unidirectional channels (Q290516) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Sharing the quantum state and the classical information simultaneously (Q518805) (← links)
- Proactive quantum secret sharing (Q898470) (← links)
- Secure threshold multi authority attribute based encryption without a central authority (Q985083) (← links)
- Secure distributed storage and retrieval (Q1575652) (← links)
- Timed-release computational secret sharing and threshold encryption (Q1692147) (← links)
- Perennial secure multi-party computation of universal Turing machine (Q1737594) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- Communication-efficient proactive MPC for dynamic groups with dishonest majorities (Q2096629) (← links)
- Fluid MPC: secure multiparty computation with dynamic participants (Q2128557) (← links)
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms (Q2146105) (← links)
- A verifiable threshold secret sharing scheme based on lattices (Q2224837) (← links)
- Communication-efficient proactive secret sharing for dynamic groups with dishonest majorities (Q2229260) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Secure publicly verifiable and proactive secret sharing schemes with general access structure (Q2291769) (← links)
- Long term confidentiality: a survey (Q2448088) (← links)
- A dynamic threshold commercial key escrow scheme based on conic (Q2490992) (← links)
- Provably secure threshold password-authenticated key exchange (Q2507695) (← links)
- Orthogonal matrix and its application in Bloom's threshold scheme (Q2631929) (← links)
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups (Q2794492) (← links)
- Provably-Secure Remote Memory Attestation for Heap Overflow Protection (Q2827711) (← links)
- Proactive Secret Sharing with a Dishonest Majority (Q2827737) (← links)
- Dynamic and Verifiable Hierarchical Secret Sharing (Q2953806) (← links)
- Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness (Q2953817) (← links)
- How to Share a Secret, Infinitely (Q3181038) (← links)
- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary (Q3511161) (← links)
- Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks (Q3600331) (← links)
- Storing and Retrieving Secrets on a Blockchain (Q5087260) (← links)
- Эллиптическая пороговая схема разделения секрета (Q5221666) (← links)
- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network (Q5502790) (← links)
- Quantum attribute-based encryption: a comprehensive study (Q6050246) (← links)
- An efficient publicly verifiable and proactive secret sharing scheme (Q6112179) (← links)