scientific article
From MaRDI portal
zbMath0789.68048MaRDI QIDQ4035739
Publication date: 18 May 1993
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Upslices, downslices, and secret-sharing with complexity of \(1.5^n\), Secret-sharing schemes for very dense graphs, Weaknesses in Some Threshold Cryptosystems, Robust and Efficient Sharing of RSA Functions, Threshold cryptography based on Asmuth-Bloom secret sharing, Reputation management and signature delegation: A distributed approach, Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states, Abelian sharing, common informations, and linear rank inequalities, A group identification protocol with leakage resilience of secret sharing scheme, Optimal resilient threshold GQ signatures, Threshold and multi-signature schemes from linear hash functions, Threshold signature scheme with threshold verification based on multivariate linear polynomial, Robust Threshold Schemes Based on the Chinese Remainder Theorem, Three systems for shared generation of authenticators, Secure multiparty computation from threshold encryption based on class groups, On Linear Secret Sharing for Connectivity in Directed Graphs, Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing, Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, Secret-Sharing Schemes: A Survey, A Lossless Linear Algebraic Secret Image Sharing Scheme, An efficient threshold RSA digital signature scheme, Efficient certificateless threshold signatures without random oracles, Threshold RSA for Dynamic and Ad-Hoc Groups, Two-operation homomorphic perfect sharing schemes over rings, An LWE-based verifiable threshold secret sharing scheme, Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry, Threshold schemes from isogeny assumptions, Practical Threshold Signatures with Linear Secret Sharing Schemes, Secret Sharing Schemes for Dense Forbidden Graphs, Threshold-directed signature scheme based on hybrid number theoretic problems, Threshold verification scheme to a valid-signature using identity only on specialized approval, Ideal homomorphic secret sharing schemes over cyclic groups, Secure distributed storage and retrieval, New efficient and secure protocols for verifiable signature sharing and other applications, Improvements of generalization of threshold signature and authenticated encryption for group communications, A rational threshold signature model and protocol based on different permissions, Adaptively secure distributed public-key systems., Robust threshold DSS signatures, Efficient and Adaptive Threshold Signatures for Ad hoc networks, Sharing DSS by the Chinese remainder theorem, Security of Wang et al. 's group-oriented \((t,n)\) threshold signature schemes with traceable signers, Dynamic threshold secret reconstruction and its application to the threshold cryptography, \textsf{CSI-RAShi}: distributed key generation for CSIDH