Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Verifiable secret sharing in a total of three rounds

From MaRDI portal
Publication:456152
Jump to:navigation, search

DOI10.1016/j.ipl.2012.08.003zbMath1250.94053OpenAlexW2015316544MaRDI QIDQ456152

Shashank Agrawal

Publication date: 23 October 2012

Published in: Information Processing Letters (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.ipl.2012.08.003

zbMATH Keywords

cryptographyunconditional securitysecret sharingByzantine adversaryround optimality


Mathematics Subject Classification ID

Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)


Related Items

Secure Computation with Minimal Interaction, Revisited



Cites Work

  • A lower bound for the time to assure interactive consistency
  • Improving the round complexity of VSS in point-to-point networks
  • How to share a secret
  • The Round Complexity of Verifiable Secret Sharing Revisited
  • Reaching Agreement in the Presence of Faults
  • The round complexity of verifiable secret sharing and secure multicast
  • Theory of Cryptography
Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:456152&oldid=12332416"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 30 January 2024, at 05:23.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki