Pages that link to "Item:Q882774"
From MaRDI portal
The following pages link to Secure distributed key generation for discrete-log based cryptosystems (Q882774):
Displaying 50 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Certificateless threshold signature secure in the standard model (Q497178) (← links)
- Certificateless threshold signature scheme from bilinear maps (Q621600) (← links)
- FROST: Flexible round-optimized Schnorr threshold signatures (Q832324) (← links)
- Secure threshold multi authority attribute based encryption without a central authority (Q985083) (← links)
- Perfectly secure data aggregation via shifted projections (Q1615724) (← links)
- Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications (Q1799267) (← links)
- Implementing, and keeping in check, a DSL used in E-learning (Q2039947) (← links)
- Aggregatable distributed key generation (Q2056680) (← links)
- \textsf{CSI-RAShi}: distributed key generation for CSIDH (Q2118548) (← links)
- Threshold Schnorr with stateless deterministic signing from standard assumptions (Q2120070) (← links)
- Implementing secure reporting of sexual misconduct -- revisiting WhoToo (Q2146102) (← links)
- Efficient threshold-optimal ECDSA (Q2149818) (← links)
- Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols (Q2170001) (← links)
- Asynchronous Byzantine agreement with optimal resilience (Q2251153) (← links)
- Practical (fully) distributed signatures provably secure in the standard model (Q2354772) (← links)
- Efficient RSA key generation and threshold Paillier in the two-party setting (Q2423838) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- Secure node discovery in ad-hoc networks and applications (Q2864180) (← links)
- Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting (Q2890015) (← links)
- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations (Q2947113) (← links)
- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties (Q2947120) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- (Q3365856) (← links)
- Fair Threshold Decryption with Semi-Trusted Third Parties (Q3634502) (← links)
- Fully Secure Threshold Unsigncryption (Q4933226) (← links)
- (Q5001214) (← links)
- Advances in Cryptology - EUROCRYPT 2004 (Q5307251) (← links)
- Applied Cryptography and Network Security (Q5443094) (← links)
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority (Q5504641) (← links)
- On the (in)security of ROS (Q5918406) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918439) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918662) (← links)
- On the (in)security of ROS (Q5925576) (← links)
- Threshold and multi-signature schemes from linear hash functions (Q6083683) (← links)
- MuSig-L: lattice-based multi-signature with single-round online phase (Q6104337) (← links)
- Encapsulated search index: public-key, sub-linear, distributed, and delegatable (Q6113958) (← links)
- Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\) (Q6132407) (← links)
- Traceable receipt-free encryption (Q6135436) (← links)
- Astrolabous: a universally composable time-lock encryption scheme (Q6157525) (← links)
- Building blocks of sharding blockchain systems: concepts, approaches, and open problems (Q6158770) (← links)
- End-to-End Verifiable Quadratic Voting with Everlasting Privacy (Q6166542) (← links)
- Better than advertised security for non-interactive threshold signatures (Q6166964) (← links)
- TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF (Q6487200) (← links)
- Practical robust DKG protocols for CSIDH (Q6535118) (← links)
- CSI-SharK: CSI-FiSh with sharing-friendly keys (Q6535498) (← links)
- TVES: threshold verifiably encrypted signature and its applications (Q6573646) (← links)
- VSS from distributed ZK proofs and applications (Q6595689) (← links)
- Two-party GOST signature scheme (Q6598554) (← links)