Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
From MaRDI portal
Publication:5025956
DOI10.21857/mnlqgc582yzbMath1492.94131OpenAlexW3197624382MaRDI QIDQ5025956
No author found.
Publication date: 7 February 2022
Published in: Sv. 25(2021)=knj. 60 (Search for Journal in Brave)
Full work available at URL: https://hrcak.srce.hr/file/380448
threshold cryptosystemPaillier cryptosystemhierarchical secret sharinghomomorphic cryptosystemdynamic secret sharing
Cites Work
- Hierarchical threshold secret sharing
- Efficient secure two-party protocols. Techniques and constructions
- Performing computations on hierarchically shared secrets
- Homomorphic public-key cryptosystems and encrypting Boolean circuits
- Dynamic and Verifiable Hierarchical Secret Sharing
- How to share a secret
- Ideal Hierarchical Secret Sharing Schemes
- Secure Multiparty Computation Goes Live
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Threshold cryptosystem with multiple secret sharing policies
- Foundations of Cryptography
- Foundations of Cryptography
- Advances in Cryptology - CRYPTO 2003
- Threshold RSA for Dynamic and Ad-Hoc Groups
- Theory of Cryptography
- Advances in Cryptology - ASIACRYPT 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer