Publicly Verifiable Secret Sharing
From MaRDI portal
Publication:2876899
DOI10.1007/3-540-68339-9_17zbMath1304.94109OpenAlexW1837145606MaRDI QIDQ2876899
Publication date: 20 August 2014
Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-68339-9_17
Related Items (46)
New multisignature scheme for specified group of verifiers ⋮ Memory leakage-resilient secret sharing schemes ⋮ Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability ⋮ Report and trace ring signatures ⋮ On ASGS framework: general requirements and an example of implementation ⋮ Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems ⋮ A non-interactive \((t, n)\)-publicly verifiable multi-secret sharing scheme ⋮ Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols ⋮ Practical non-interactive publicly verifiable secret sharing with thousands of parties ⋮ Cryptographic algorithms for privacy-preserving online applications ⋮ Paillier-based publicly verifiable (non-interactive) secret sharing ⋮ Efficient democratic group signatures with threshold traceability ⋮ An efficient publicly verifiable and proactive secret sharing scheme ⋮ YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model ⋮ Improving the efficiency of report and trace ring signatures ⋮ Building blocks of sharding blockchain systems: concepts, approaches, and open problems ⋮ On actively secure fine-grained access structures from isogeny assumptions ⋮ Network-agnostic security comes (almost) for free in DKG and MPC ⋮ Verifiable quantum \((k,n)\)-threshold secret key sharing ⋮ Public-key generation with verifiable randomness ⋮ Interpolation of the Double Discrete Logarithm ⋮ Leakproof secret sharing protocols with applications to group identification scheme ⋮ Group Encryption ⋮ A novel ID-based group signature ⋮ Efficient VSS free of computational assumption ⋮ Secure distributed constraint satisfaction: reaching agreement without revealing private information ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Attacks to some verifiable multi-secret sharing schemes and two improved schemes ⋮ Zero-knowledge argument for simultaneous discrete logarithms ⋮ A pairing-based publicly verifiable secret sharing scheme ⋮ An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme ⋮ An efficient multi-use multi-secret sharing scheme based on hash function ⋮ Transformations of Cryptographic Schemes Through Interpolation Techniques ⋮ Secure publicly verifiable and proactive secret sharing schemes with general access structure ⋮ A novel secret sharing scheme using multiple share images ⋮ Threshold changeable secret sharing with secure secret reconstruction ⋮ An LWE-based verifiable threshold secret sharing scheme ⋮ Counting fixed points and rooted closed walks of the singular map \(x \mapsto x^{x^n}\) modulo powers of a prime ⋮ Public Verifiability from Pairings in Secret Sharing Schemes ⋮ Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials ⋮ Publicly Verifiable Secret Sharing for Cloud-Based Key Management ⋮ Encryption Switching Protocols ⋮ Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system ⋮ New efficient and secure protocols for verifiable signature sharing and other applications ⋮ Efficient compiler to covert security with public verifiability for honest majority MPC ⋮ Dynamic threshold secret reconstruction and its application to the threshold cryptography
This page was built for publication: Publicly Verifiable Secret Sharing