scientific article
From MaRDI portal
Publication:3374942
zbMath1082.94545MaRDI QIDQ3374942
Publication date: 1 March 2006
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (58)
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting ⋮ Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms ⋮ Threshold cryptography based on Asmuth-Bloom secret sharing ⋮ Multi-rate threshold FlipThem ⋮ Optimal resilient threshold GQ signatures ⋮ Algorithms for a distributed IDS in MANETs ⋮ Paillier-based publicly verifiable (non-interactive) secret sharing ⋮ Compressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures ⋮ SoK: blockchain light clients ⋮ Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party ⋮ New results and applications for multi-secret sharing schemes ⋮ Threshold and multi-signature schemes from linear hash functions ⋮ DualDory: logarithmic-verifier linkable ring signatures through preprocessing ⋮ Efficient RSA key generation and threshold Paillier in the two-party setting ⋮ Robust Threshold Schemes Based on the Chinese Remainder Theorem ⋮ Expected linear round synchronization: the missing link for linear Byzantine SMR ⋮ Better than advertised security for non-interactive threshold signatures ⋮ Threshold signatures with private accountability ⋮ Towards practical homomorphic time-lock puzzles: applicability and verifiability ⋮ How to recover a secret with \(O(n)\) additions ⋮ Practical Schnorr threshold signatures without the algebraic group model ⋮ Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers ⋮ On the Validity of Consensus ⋮ Asynchronous Multi-Party Computation with Quadratic Communication ⋮ Leakproof secret sharing protocols with applications to group identification scheme ⋮ An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner ⋮ Non-interactive identity-based threshold signature scheme without random oracles ⋮ Adaptively Secure Non-interactive Threshold Cryptosystems ⋮ Zero-knowledge argument for simultaneous discrete logarithms ⋮ Threshold undeniable signature scheme based on conic ⋮ An efficient threshold RSA digital signature scheme ⋮ A robust \((k,n)+1\) threshold proxy signature scheme based on factoring ⋮ Efficient certificateless threshold signatures without random oracles ⋮ Simplified Threshold RSA with Adaptive and Proactive Security ⋮ A new construction of threshold cryptosystems based on RSA ⋮ A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents ⋮ On Optimal Probabilistic Asynchronous Byzantine Agreement ⋮ Fast secure two-party ECDSA signing ⋮ Threshold RSA for Dynamic and Ad-Hoc Groups ⋮ Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry ⋮ Blackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemes ⋮ Lower bounds for leakage-resilient secret sharing ⋮ Threshold schemes from isogeny assumptions ⋮ Bandwidth-efficient threshold EC-DSA ⋮ Fair Threshold Decryption with Semi-Trusted Third Parties ⋮ Practical Threshold Signatures with Linear Secret Sharing Schemes ⋮ BETA: biometric-enabled threshold authentication ⋮ Always have a backup plan: fully secure synchronous MPC with asynchronous fallback ⋮ Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security ⋮ Efficient and Adaptive Threshold Signatures for Ad hoc networks ⋮ The fault-tolerant cluster-sending problem ⋮ ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability ⋮ Sharing DSS by the Chinese remainder theorem ⋮ Dynamic threshold secret reconstruction and its application to the threshold cryptography ⋮ Practical (fully) distributed signatures provably secure in the standard model ⋮ \textsf{CSI-RAShi}: distributed key generation for CSIDH
This page was built for publication: