VSS from distributed ZK proofs and applications
From MaRDI portal
Publication:6595689
DOI10.1007/978-981-99-8721-4_13zbMATH Open1546.94115MaRDI QIDQ6595689
Shahla Atapoor, Robi Pedersen, Daniele Cozzo, Karim Baghery
Publication date: 30 August 2024
isogeniesverifiable secret sharingthreshold signaturesShamir secret sharingDKGZK proofs on secret shared data
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- FROST: Flexible round-optimized Schnorr threshold signatures
- Secure distributed key generation for discrete-log based cryptosystems
- CSIDH: an efficient post-quantum commutative group action
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- An isogeny-based ID protocol using structured public keys
- Practical non-interactive publicly verifiable secret sharing with thousands of parties
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Zero-knowledge proofs on secret-shared data via fully linear PCPs
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Post-quantum security of Fiat-Shamir
- Circuit amortization friendly encodingsand their application to statistically secure multiparty computation
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- How to share a secret
- The Arithmetic of Elliptic Curves
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- On Zeros of a Polynomial in a Finite Grid
- Computationally Binding Quantum Commitments
- On the (in)security of ROS
- SCALLOP: scaling the CSI-FiSh
- On actively secure fine-grained access structures from isogeny assumptions
- Practical robust DKG protocols for CSIDH
- CSI-SharK: CSI-FiSh with sharing-friendly keys
Related Items (2)
Identity-based threshold signatures from isogenies ⋮ \textit{Flood and submerse}: distributed key generation and robust threshold signature from lattices
This page was built for publication: VSS from distributed ZK proofs and applications