Traceable secret sharing and applications
From MaRDI portal
Publication:2129017
DOI10.1007/978-3-030-84252-9_24zbMath1487.94154OpenAlexW3176088383MaRDI QIDQ2129017
Vipul Goyal, Akshayaram Srinivasan, Yifan Song
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_24
Related Items (3)
Storing and Retrieving Secrets on a Blockchain ⋮ KDM security for the Fujisaki-Okamoto transformations in the QROM ⋮ Threshold signatures with private accountability
Cites Work
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- How to share a function securely
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Asymmetric Fingerprinting
- How to share a secret
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Collusion resistant traitor tracing from learning with errors
- Public Traceability in Traitor Tracing Schemes
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Optimal probabilistic fingerprint codes
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Traceable secret sharing and applications