Adaptively secure threshold symmetric-key encryption
From MaRDI portal
Publication:2152046
DOI10.1007/978-3-030-65277-7_21zbMath1492.94149OpenAlexW3097591037MaRDI QIDQ2152046
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_21
efficiencyfault toleranceavailabilityadaptive securitydistributed key generationerasure-freenessfully distributed schemesnon-interactivitythreshold signatures
Related Items (2)
Adaptively secure threshold symmetric-key encryption ⋮ ParaDiSE: efficient threshold authenticated encryption in fully malicious model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
- Securing threshold cryptosystems against chosen ciphertext attack
- Adaptively secure distributed PRFs from LWE
- Threshold cryptosystems from threshold fully homomorphic encryption
- Adaptively secure threshold symmetric-key encryption
- How to share a function securely
- Robust Threshold DSS Signatures
- Born and raised distributively
- How to share a secret
- Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
- Secure Multiparty AES
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- New Techniques for Noninteractive Zero-Knowledge
- Threshold RSA for Dynamic and Ad-Hoc Groups
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Adaptively secure threshold symmetric-key encryption