Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1304079 - MaRDI portal

scientific article; zbMATH DE number 1304079

From MaRDI portal
Publication:4250769

zbMath0931.94021MaRDI QIDQ4250769

Tal Rabin, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk

Publication date: 7 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

On the round complexity of randomized Byzantine agreementA practical anonymous payment scheme for electronic commerceBoneh-Franklin IBEAnonymous Authentication with Optional Shared Anonymity Revocation and LinkabilityBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesOn ASGS framework: general requirements and an example of implementationElectronic jury voting protocolsBeating the Birthday Paradox in Dining Cryptographer NetworksPractical Threshold Signatures Without Random OraclesProvably unforgeable threshold EdDSA with an offline participant and trustless setupNetwork-agnostic security comes (almost) for free in DKG and MPCPractical Schnorr threshold signatures without the algebraic group modelA practical anonymous multi-authority e-cash scheme.Privacy Preserving Data Mining within Anonymous Credential SystemsNon-interactive identity-based threshold signature scheme without random oraclesOne forward-secure signature scheme using bilinear maps and its applicationsAdaptively Secure Non-interactive Threshold CryptosystemsEfficient generic on-line/off-line (threshold) signatures without key exposureEfficient certificateless threshold signatures without random oraclesEfficient hybrid encryption from ID-based encryptionFair Traceable Multi-Group SignaturesEfficient Simultaneous BroadcastProvably secure threshold password-authenticated key exchangeSecure publicly verifiable and proactive secret sharing schemes with general access structureThreshold ECDSA with an offline recovery partyThreshold schemes from isogeny assumptionsDesigning a secure e-tender submission protocolThreshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet SecurityNew efficient and secure protocols for verifiable signature sharing and other applicationsEscrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using BitcoinAdaptively secure distributed public-key systems.Robust threshold DSS signaturesPrivacy preserving link analysis on dynamic weighted graphThe design of a secure and fair sealed-bid auction service