Pages that link to "Item:Q882774"
From MaRDI portal
The following pages link to Secure distributed key generation for discrete-log based cryptosystems (Q882774):
Displaying 46 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Certificateless threshold signature secure in the standard model (Q497178) (← links)
- Certificateless threshold signature scheme from bilinear maps (Q621600) (← links)
- FROST: Flexible round-optimized Schnorr threshold signatures (Q832324) (← links)
- Secure threshold multi authority attribute based encryption without a central authority (Q985083) (← links)
- Perfectly secure data aggregation via shifted projections (Q1615724) (← links)
- Implementing, and keeping in check, a DSL used in E-learning (Q2039947) (← links)
- Aggregatable distributed key generation (Q2056680) (← links)
- \textsf{CSI-RAShi}: distributed key generation for CSIDH (Q2118548) (← links)
- Threshold Schnorr with stateless deterministic signing from standard assumptions (Q2120070) (← links)
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo (Q2146102) (← links)
- Efficient threshold-optimal ECDSA (Q2149818) (← links)
- Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols (Q2170001) (← links)
- Asynchronous Byzantine agreement with optimal resilience (Q2251153) (← links)
- Practical (fully) distributed signatures provably secure in the standard model (Q2354772) (← links)
- Efficient RSA key generation and threshold Paillier in the two-party setting (Q2423838) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- Secure Node Discovery in Ad-hoc Networks and Applications (Q2864180) (← links)
- Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting (Q2890015) (← links)
- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations (Q2947113) (← links)
- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties (Q2947120) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- Fair Threshold Decryption with Semi-Trusted Third Parties (Q3634502) (← links)
- Fully Secure Threshold Unsigncryption (Q4933226) (← links)
- (Q5001214) (← links)
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority (Q5504641) (← links)
- On the (in)security of ROS (Q5918406) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918439) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918662) (← links)
- On the (in)security of ROS (Q5925576) (← links)
- Building blocks of sharding blockchain systems: concepts, approaches, and open problems (Q6158770) (← links)
- Practical robust DKG protocols for CSIDH (Q6535118) (← links)
- CSI-SharK: CSI-FiSh with sharing-friendly keys (Q6535498) (← links)
- TVES: threshold verifiably encrypted signature and its applications (Q6573646) (← links)
- VSS from distributed ZK proofs and applications (Q6595689) (← links)
- Two-party GOST signature scheme (Q6598554) (← links)
- Cutting the GRASS: threshold group action signature schemes (Q6636123) (← links)
- Twinkle: threshold signatures from DDH with full adaptive security (Q6636400) (← links)
- SPRINT: high-throughput robust distributed Schnorr signatures (Q6637538) (← links)
- Fast batched asynchronous distributed key generation (Q6637551) (← links)
- Adaptively secure BLS threshold signatures from DDH and co-CDH (Q6653010) (← links)
- Round-optimal, fully secure distributed key generation (Q6653011) (← links)
- Threshold encryption with silent setup (Q6653013) (← links)
- How to prove statements obliviously? (Q6660309) (← links)
- An improved threshold homomorphic cryptosystem based on class groups (Q6660542) (← links)