Simplified Threshold RSA with Adaptive and Proactive Security
From MaRDI portal
Publication:3593121
DOI10.1007/11761679_35zbMath1140.94319OpenAlexW1535955323MaRDI QIDQ3593121
Jesús F. Almansa, Jesper Buus Nielsen, Ivan B. Damgård
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_35
Related Items (13)
Adaptively secure distributed PRFs from LWE ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Optimal resilient threshold GQ signatures ⋮ Threshold and multi-signature schemes from linear hash functions ⋮ Perfect MPC over layered graphs ⋮ Fully adaptive Schnorr threshold signatures ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Non-interactive identity-based threshold signature scheme without random oracles ⋮ Adaptively Secure Non-interactive Threshold Cryptosystems ⋮ Communication-Optimal Proactive Secret Sharing for Dynamic Groups ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Virtual Smart Cards: How to Sign with a Password and a Server
Cites Work
- Financial cryptography. 3rd international conference, FC '99. Anguilla, British West Indies, February 22--25, 1999. Proceedings
- How to share a function securely
- Robust and Efficient Sharing of RSA Functions
- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
- How to withstand mobile virus attacks (extended abstract)
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Simplified Threshold RSA with Adaptive and Proactive Security