Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1418293 - MaRDI portal

scientific article; zbMATH DE number 1418293

From MaRDI portal
Publication:4941853

zbMath0940.94016MaRDI QIDQ4941853

Berry Schoenmakers

Publication date: 26 July 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (25)

Memory leakage-resilient secret sharing schemesA non-interactive \((t, n)\)-publicly verifiable multi-secret sharing schemeElectronic jury voting protocolsPractical non-interactive publicly verifiable secret sharing with thousands of partiesPaillier-based publicly verifiable (non-interactive) secret sharingEfficient democratic group signatures with threshold traceabilityProvably unforgeable threshold EdDSA with an offline participant and trustless setupAn efficient publicly verifiable and proactive secret sharing schemeYOLO YOSO: fast and simple encryption and secret sharing in the YOSO modelBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsHomomorphic extensions of CRT-based secret sharingQuantum designated verifier signature scheme with semi-trusted third-partySemi-quantum designated verifier signature schemeLeakproof secret sharing protocols with applications to group identification schemeSeveral cryptographic applications of \(\Sigma\)-protocolEfficient VSS free of computational assumptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationSecret, verifiable auctions from electionsA pairing-based publicly verifiable secret sharing schemeA General, Flexible and Efficient Proof of Inclusion and ExclusionThreshold ECDSA with an offline recovery partyPublic Verifiability from Pairings in Secret Sharing SchemesPublicly Verifiable Secret Sharing for Cloud-Based Key ManagementEfficient compiler to covert security with public verifiability for honest majority MPCPrivacy preserving electronic data gathering




This page was built for publication: