Threshold Cryptosystems Based on Factoring
From MaRDI portal
Publication:4412798
DOI10.1007/3-540-36178-2_12zbMath1065.94552OpenAlexW1561499760MaRDI QIDQ4412798
Mordechai M. Yung, Jonathan N. Katz
Publication date: 16 July 2003
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36178-2_12
threshold signature schemethreshold cryptosystemsRabin encryption schemethreshold homomorphic encryption schemes
Related Items (6)
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Secure multiparty computation with sublinear preprocessing ⋮ A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties ⋮ Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\) ⋮ Better than advertised security for non-interactive threshold signatures ⋮ The rise of Paillier: homomorphic secret sharing and public-key silent OT
This page was built for publication: Threshold Cryptosystems Based on Factoring