The following pages link to (Q4941850):
Displaying 21 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Leakproof secret sharing protocols with applications to group identification scheme (Q439799) (← links)
- Distributed certificateless key encapsulation mechanism secure against the adaptive adversary (Q615208) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- Non-interactive identity-based threshold signature scheme without random oracles (Q943088) (← links)
- Adaptively secure distributed PRFs from LWE (Q1631339) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\) (Q2043324) (← links)
- Aggregatable distributed key generation (Q2056680) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- Provably secure threshold password-authenticated key exchange (Q2507695) (← links)
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups (Q2794492) (← links)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (Q2822671) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Practical Threshold Signatures Without Random Oracles (Q3503882) (← links)
- Simplified Threshold RSA with Adaptive and Proactive Security (Q3593121) (← links)
- Adaptively Secure Two-Party Computation with Erasures (Q3623039) (← links)
- Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption (Q4975186) (← links)