Public Key Cryptography - PKC 2006
From MaRDI portal
Publication:5898937
DOI10.1007/11745853zbMath1151.94501OpenAlexW4205680410MaRDI QIDQ5898937
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11745853
Related Items (12)
Adaptively secure distributed PRFs from LWE ⋮ Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\) ⋮ On actively secure fine-grained access structures from isogeny assumptions ⋮ Secure multiparty computation from threshold encryption based on class groups ⋮ Efficient integer span program for hierarchical threshold access structure ⋮ An expressive and provably secure ciphertext-policy attribute-based encryption ⋮ Efficient Secure Two-Party Exponentiation ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Blackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemes ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Efficient, Robust and Constant-Round Distributed RSA Key Generation ⋮ Practical (fully) distributed signatures provably secure in the standard model
This page was built for publication: Public Key Cryptography - PKC 2006