scientific article; zbMATH DE number 1304079
From MaRDI portal
Publication:4250769
zbMath0931.94021MaRDI QIDQ4250769
Tal Rabin, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk
Publication date: 7 March 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
discrete logarithmverifiable secret sharingthreshold cryptographydistributed key generation protocol
Related Items
On the round complexity of randomized Byzantine agreement ⋮ A practical anonymous payment scheme for electronic commerce ⋮ Boneh-Franklin IBE ⋮ Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ On ASGS framework: general requirements and an example of implementation ⋮ Electronic jury voting protocols ⋮ Beating the Birthday Paradox in Dining Cryptographer Networks ⋮ Practical Threshold Signatures Without Random Oracles ⋮ Provably unforgeable threshold EdDSA with an offline participant and trustless setup ⋮ Network-agnostic security comes (almost) for free in DKG and MPC ⋮ Practical Schnorr threshold signatures without the algebraic group model ⋮ A practical anonymous multi-authority e-cash scheme. ⋮ Privacy Preserving Data Mining within Anonymous Credential Systems ⋮ Non-interactive identity-based threshold signature scheme without random oracles ⋮ One forward-secure signature scheme using bilinear maps and its applications ⋮ Adaptively Secure Non-interactive Threshold Cryptosystems ⋮ Efficient generic on-line/off-line (threshold) signatures without key exposure ⋮ Efficient certificateless threshold signatures without random oracles ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Fair Traceable Multi-Group Signatures ⋮ Efficient Simultaneous Broadcast ⋮ Provably secure threshold password-authenticated key exchange ⋮ Secure publicly verifiable and proactive secret sharing schemes with general access structure ⋮ Threshold ECDSA with an offline recovery party ⋮ Threshold schemes from isogeny assumptions ⋮ Designing a secure e-tender submission protocol ⋮ Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security ⋮ New efficient and secure protocols for verifiable signature sharing and other applications ⋮ Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin ⋮ Adaptively secure distributed public-key systems. ⋮ Robust threshold DSS signatures ⋮ Privacy preserving link analysis on dynamic weighted graph ⋮ The design of a secure and fair sealed-bid auction service