Threshold cryptosystems from threshold fully homomorphic encryption

From MaRDI portal
Publication:1673409

DOI10.1007/978-3-319-96884-1_19zbMath1444.94047OpenAlexW2794501668MaRDI QIDQ1673409

Peng Zhang

Publication date: 12 September 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-96884-1_19




Related Items

Two-round MPC: information-theoretic and black-boxAdaptively secure distributed PRFs from LWEAdaptively secure threshold symmetric-key encryptionPrivacy-preserving mixed set operationsRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionEfficient and universally composable single secret leader election from pairingsMuSig-L: lattice-based multi-signature with single-round online phaseQuantum-resistant password-based threshold single-sign-on authentication with updatable server private keyMixed-technique multi-party computations composed of two-party computationsFast two-party signature for upgrading ECDSA to two-party scenario easilyMaliciously secure massively parallel computation for all-but-one corruptionsSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?Better than advertised security for non-interactive threshold signaturesHow to recover a secret with \(O(n)\) additionsMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNSecure MPC: laziness leads to GODSLAP: simpler, improved private stream aggregation from ring learning with errorsAn efficient threshold access-structure for RLWE-based multiparty homomorphic encryptionEfficient, actively secure MPC with a dishonest majority: a surveyTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Combiners for functional encryption, unconditionallyThreshold ring signatures: new definitions and post-quantum securityAdaptively secure MPC with sublinear communication complexityDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsBETA: biometric-enabled threshold authenticationMulti-party threshold private set intersection with sublinear communication