Fair Threshold Decryption with Semi-Trusted Third Parties
From MaRDI portal
Publication:3634502
DOI10.1007/978-3-642-02620-1_22zbMath1284.94081OpenAlexW1759403107MaRDI QIDQ3634502
Ji-Hye Kim, Jeongdae Hong, Jinil Kim, Matthew Franklin, Kun Soo Park
Publication date: 25 June 2009
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02620-1_22
Related Items (1)
Cites Work
- Secure distributed key generation for discrete-log based cryptosystems
- Robust threshold DSS signatures
- Robust and efficient sharing of RSA functions.
- How to share a function securely
- How to share a secret
- Robust and Efficient Sharing of RSA Functions
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Optimistic fair exchange of digital signatures
- Advances in Cryptology - CRYPTO 2003
- Privacy-Preserving Set Operations
- Threshold RSA for Dynamic and Ad-Hoc Groups
- Legally-Enforceable Fairness in Secure Two-Party Computation
- Completely fair SFE and coalition-safe cheap talk
- Optimistic Fair Exchange in a Multi-user Setting
- Theory of Cryptography
- A fair and efficient solution to the socialist millionaires' problem
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Fair Threshold Decryption with Semi-Trusted Third Parties