Publicly Verifiable Secret Sharing

From MaRDI portal
Publication:2876899

DOI10.1007/3-540-68339-9_17zbMath1304.94109OpenAlexW1837145606MaRDI QIDQ2876899

Markus A. Stadler

Publication date: 20 August 2014

Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68339-9_17




Related Items (46)

New multisignature scheme for specified group of verifiersMemory leakage-resilient secret sharing schemesAnonymous Authentication with Optional Shared Anonymity Revocation and LinkabilityReport and trace ring signaturesOn ASGS framework: general requirements and an example of implementationAlgebraic secret sharing using privacy homomorphisms for IoT-based healthcare systemsA non-interactive \((t, n)\)-publicly verifiable multi-secret sharing schemeGuaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocolsPractical non-interactive publicly verifiable secret sharing with thousands of partiesCryptographic algorithms for privacy-preserving online applicationsPaillier-based publicly verifiable (non-interactive) secret sharingEfficient democratic group signatures with threshold traceabilityAn efficient publicly verifiable and proactive secret sharing schemeYOLO YOSO: fast and simple encryption and secret sharing in the YOSO modelImproving the efficiency of report and trace ring signaturesBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsOn actively secure fine-grained access structures from isogeny assumptionsNetwork-agnostic security comes (almost) for free in DKG and MPCVerifiable quantum \((k,n)\)-threshold secret key sharingPublic-key generation with verifiable randomnessInterpolation of the Double Discrete LogarithmLeakproof secret sharing protocols with applications to group identification schemeGroup EncryptionA novel ID-based group signatureEfficient VSS free of computational assumptionSecure distributed constraint satisfaction: reaching agreement without revealing private informationExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationAttacks to some verifiable multi-secret sharing schemes and two improved schemesZero-knowledge argument for simultaneous discrete logarithmsA pairing-based publicly verifiable secret sharing schemeAn improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing schemeAn efficient multi-use multi-secret sharing scheme based on hash functionTransformations of Cryptographic Schemes Through Interpolation TechniquesSecure publicly verifiable and proactive secret sharing schemes with general access structureA novel secret sharing scheme using multiple share imagesThreshold changeable secret sharing with secure secret reconstructionAn LWE-based verifiable threshold secret sharing schemeCounting fixed points and rooted closed walks of the singular map \(x \mapsto x^{x^n}\) modulo powers of a primePublic Verifiability from Pairings in Secret Sharing SchemesEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsPublicly Verifiable Secret Sharing for Cloud-Based Key ManagementEncryption Switching ProtocolsBlocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage systemNew efficient and secure protocols for verifiable signature sharing and other applicationsEfficient compiler to covert security with public verifiability for honest majority MPCDynamic threshold secret reconstruction and its application to the threshold cryptography




This page was built for publication: Publicly Verifiable Secret Sharing