Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3374942

zbMath1082.94545MaRDI QIDQ3374942

Victor Shoup

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (58)

Efficient RSA Key Generation and Threshold Paillier in the Two-Party SettingSashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing ProtocolBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesImproved threshold signatures, proactive secret sharing, and input certification from LSS isomorphismsThreshold cryptography based on Asmuth-Bloom secret sharingMulti-rate threshold FlipThemOptimal resilient threshold GQ signaturesAlgorithms for a distributed IDS in MANETsPaillier-based publicly verifiable (non-interactive) secret sharingCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesSoK: blockchain light clientsBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyNew results and applications for multi-secret sharing schemesThreshold and multi-signature schemes from linear hash functionsDualDory: logarithmic-verifier linkable ring signatures through preprocessingEfficient RSA key generation and threshold Paillier in the two-party settingRobust Threshold Schemes Based on the Chinese Remainder TheoremExpected linear round synchronization: the missing link for linear Byzantine SMRBetter than advertised security for non-interactive threshold signaturesThreshold signatures with private accountabilityTowards practical homomorphic time-lock puzzles: applicability and verifiabilityHow to recover a secret with \(O(n)\) additionsPractical Schnorr threshold signatures without the algebraic group modelSecure rational numbers equivalence test based on threshold cryptosystem with rational numbersOn the Validity of ConsensusAsynchronous Multi-Party Computation with Quadratic CommunicationLeakproof secret sharing protocols with applications to group identification schemeAn RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted CombinerNon-interactive identity-based threshold signature scheme without random oraclesAdaptively Secure Non-interactive Threshold CryptosystemsZero-knowledge argument for simultaneous discrete logarithmsThreshold undeniable signature scheme based on conicAn efficient threshold RSA digital signature schemeA robust \((k,n)+1\) threshold proxy signature scheme based on factoringEfficient certificateless threshold signatures without random oraclesSimplified Threshold RSA with Adaptive and Proactive SecurityA new construction of threshold cryptosystems based on RSAA Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product ExponentsOn Optimal Probabilistic Asynchronous Byzantine AgreementFast secure two-party ECDSA signingThreshold RSA for Dynamic and Ad-Hoc GroupsProvably Secure Threshold Paillier Encryption Based on Hyperplane GeometryBlackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemesLower bounds for leakage-resilient secret sharingThreshold schemes from isogeny assumptionsBandwidth-efficient threshold EC-DSAFair Threshold Decryption with Semi-Trusted Third PartiesPractical Threshold Signatures with Linear Secret Sharing SchemesBETA: biometric-enabled threshold authenticationAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackBandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive securityEfficient and Adaptive Threshold Signatures for Ad hoc networksThe fault-tolerant cluster-sending problemATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availabilitySharing DSS by the Chinese remainder theoremDynamic threshold secret reconstruction and its application to the threshold cryptographyPractical (fully) distributed signatures provably secure in the standard model\textsf{CSI-RAShi}: distributed key generation for CSIDH




This page was built for publication: