The following pages link to Theory of Cryptography (Q5898362):
Displayed 12 items.
- Verifiable secret sharing in a total of three rounds (Q456152) (← links)
- Efficient VSS free of computational assumption (Q663418) (← links)
- Strong \((n, t, n)\) verifiable secret sharing scheme (Q991242) (← links)
- On expected constant-round protocols for Byzantine agreement (Q1004599) (← links)
- Efficient asynchronous verifiable secret sharing and multiparty computation (Q2018817) (← links)
- Asynchronous Byzantine agreement with optimal resilience (Q2251153) (← links)
- Dynamic threshold secret reconstruction and its application to the threshold cryptography (Q2353654) (← links)
- Improving the round complexity of VSS in point-to-point networks (Q2389350) (← links)
- Broadcast (and Round) Efficient Verifiable Secret Sharing (Q2948264) (← links)
- Dynamic and Verifiable Hierarchical Secret Sharing (Q2953806) (← links)
- Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience (Q4931669) (← links)
- Key Management in Sensor Networks (Q5391137) (← links)