Implementing secure reporting of sexual misconduct -- revisiting WhoToo
From MaRDI portal
Publication:2146102
DOI10.1007/978-3-030-88238-9_17zbMath1489.91205OpenAlexW3204479398MaRDI QIDQ2146102
Alejandro Hevia, Ilana Mergudich-Thal
Publication date: 15 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88238-9_17
anonymitysecure multiparty computationefficient implementationsprivacy-preserving reporting of sexual misconduct
Related Items (2)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Secure distributed key generation for discrete-log based cryptosystems
- Efficient signature generation by smart cards
- Robust encryption
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- Robust Threshold DSS Signatures
- How to share a secret
- Practical Identity-Based Encryption Without Random Oracles
- A public key cryptosystem and a signature scheme based on discrete logarithms
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Advances in Cryptology – CRYPTO 2004
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Privacy-Preserving Set Operations
- Public Key Cryptography - PKC 2005
This page was built for publication: Implementing secure reporting of sexual misconduct -- revisiting WhoToo