Threshold encryption with silent setup
From MaRDI portal
Publication:6653013
DOI10.1007/978-3-031-68394-7_12MaRDI QIDQ6653013
Dimitris Kolonelos, Guru-Vamsi Policharla, Sanjam Garg, Mingyuan Wang
Publication date: 13 December 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Secure distributed key generation for discrete-log based cryptosystems
- Securing threshold cryptosystems against chosen ciphertext attack
- Registration-based encryption: removing private-key generator from IBE
- Verifiable registration-based encryption
- An algebraic framework for universal and updatable SNARKs
- Optimizing registration based encryption
- Registration-based encryption from standard assumptions
- Aurora: transparent succinct arguments for R1CS
- Automated analysis of cryptographic assumptions in generic group models
- Fast multiplication of large numbers
- Ad-hoc threshold broadcast encryption with shorter ciphertexts
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Constant-Size Commitments to Polynomials and Their Applications
- Faster Polynomial Multiplication over Finite Fields
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Constant Size Ciphertexts in Threshold Attribute-Based Encryption
- Dynamic Threshold Public-Key Encryption
- The Uber-Assumption Family
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- On the Evaluation of Powers and Monomials
- How to withstand mobile virus attacks (extended abstract)
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- On the Size of Pairing-Based Non-interactive Arguments
- Cryptography and Coding
- Topics in Cryptology – CT-RSA 2006
- Efficient laconic cryptography from learning with errors
- Registered attribute-based encryption
- Reaching consensus for asynchronous distributed key generation
- Witness encryption and null-iO from evasive LWE
- Candidate witness encryption from lattice techniques
- Linear-map vector commitments and their practical applications
- Registered (inner-product) functional encryption
- Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces
This page was built for publication: Threshold encryption with silent setup
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6653013)