The following pages link to (Q3374910):
Displaying 30 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Efficient one-sided adaptively secure computation (Q514477) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- Optimal resilient threshold GQ signatures (Q881852) (← links)
- Adaptively secure distributed PRFs from LWE (Q1631339) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- Practical public key encryption with selective opening security for receivers (Q2004703) (← links)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\) (Q2043324) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- Provably secure threshold password-authenticated key exchange (Q2507695) (← links)
- GNUC: a new universal composability framework (Q2516522) (← links)
- Adaptively secure computation with partial erasures (Q2796264) (← links)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (Q2822671) (← links)
- Memory Erasability Amplification (Q2827713) (← links)
- Adaptively Secure Non-interactive Threshold Cryptosystems (Q3012950) (← links)
- Adaptively Secure Two-Party Computation with Erasures (Q3623039) (← links)
- (Q4269754) (← links)
- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption (Q4915998) (← links)
- Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption (Q4975186) (← links)
- Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model (Q5087275) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311542) (← links)
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication (Q6157506) (← links)
- Revocable cryptography from learning with errors (Q6587947) (← links)
- Threshold structure-preserving signatures: strong and adaptive security under standard assumptions (Q6635749) (← links)
- Twinkle: threshold signatures from DDH with full adaptive security (Q6636400) (← links)
- Adaptively secure BLS threshold signatures from DDH and co-CDH (Q6653010) (← links)
- An improved threshold homomorphic cryptosystem based on class groups (Q6660542) (← links)