Threshold cryptosystems from threshold fully homomorphic encryption
From MaRDI portal
Publication:1673409
DOI10.1007/978-3-319-96884-1_19zbMath1444.94047OpenAlexW2794501668MaRDI QIDQ1673409
Publication date: 12 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-96884-1_19
Related Items
Two-round MPC: information-theoretic and black-box ⋮ Adaptively secure distributed PRFs from LWE ⋮ Adaptively secure threshold symmetric-key encryption ⋮ Privacy-preserving mixed set operations ⋮ Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model ⋮ Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption ⋮ Efficient and universally composable single secret leader election from pairings ⋮ MuSig-L: lattice-based multi-signature with single-round online phase ⋮ Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key ⋮ Mixed-technique multi-party computations composed of two-party computations ⋮ Fast two-party signature for upgrading ECDSA to two-party scenario easily ⋮ Maliciously secure massively parallel computation for all-but-one corruptions ⋮ Succinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof? ⋮ Better than advertised security for non-interactive threshold signatures ⋮ How to recover a secret with \(O(n)\) additions ⋮ Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN ⋮ Secure MPC: laziness leads to GOD ⋮ SLAP: simpler, improved private stream aggregation from ring learning with errors ⋮ An efficient threshold access-structure for RLWE-based multiparty homomorphic encryption ⋮ Efficient, actively secure MPC with a dishonest majority: a survey ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Combiners for functional encryption, unconditionally ⋮ Threshold ring signatures: new definitions and post-quantum security ⋮ Adaptively secure MPC with sublinear communication complexity ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ BETA: biometric-enabled threshold authentication ⋮ Multi-party threshold private set intersection with sublinear communication