-
1
-
-
0001917195
-
Generalized secret sharing and monotone functions
-
Josh Cohen Benaloh, Jerry Leichter: Generalized Secret Sharing and Monotone Functions. Proc. of CRYPTO 1988: 27-35
-
Proc. of CRYPTO 1988
, pp. 27-35
-
-
Benaloh, J.C.1
Leichter, J.2
-
2
-
-
0039467239
-
Amplification of probabilistic boolean formulas
-
R. B. Boppana: Amplification of Probabilistic Boolean Formulas. Advances in Computing Research 5: 27-45 (1989)
-
(1989)
Advances in Computing Research
, vol.5
, pp. 27-45
-
-
Boppana, R.B.1
-
3
-
-
0031117877
-
Better lower bounds for monotone threshold formulas
-
Jaikumar Radhakrishnan: Better Lower Bounds for Monotone Threshold Formulas. J. Comput. Syst. Sci. 54(2): 221-226 (1997)
-
(1997)
J. Comput. Syst. Sci.
, vol.54
, Issue.2
, pp. 221-226
-
-
Radhakrishnan, J.1
-
4
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Ran Canetti: Universally Composable Security: A New Paradigm for Cryptographic Protocols, FOGS 2001: 136-145.
-
FOGS 2001
, pp. 136-145
-
-
Canetti, R.1
-
5
-
-
0027239099
-
Secret sharing over infinite domains
-
Benny Chor and Eyal Kushilevitz: Secret Sharing Over Infinite Domains., J. Cryptology 6(2): 87-95 (1993)
-
(1993)
J. Cryptology
, vol.6
, Issue.2
, pp. 87-95
-
-
Chor, B.1
Kushilevitz, E.2
-
6
-
-
0029293045
-
Private computations over the integers
-
Benny Chor, Mihály Geréb-Graus and Eyal Kushilevitz Private Computations over the Integers., SIAM J. Comput. 24(2): 376-386 (1995)
-
(1995)
SIAM J. Comput.
, vol.24
, Issue.2
, pp. 376-386
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
7
-
-
84858921291
-
Secret-key zero-knowlegde and non-interactive verifiable exponentiation
-
Springer Verlag LNCS
-
Cramer and Damgård: Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation, Proc. of TCC 04, Springer Verlag LNCS.
-
Proc. of TCC 04
-
-
Cramer1
Damgård2
-
8
-
-
84937432976
-
Optimal black-box secret sharing over arbitrary abelian groups
-
Ronald Cramer, Serge Fehr: Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. Proc. of CRYPTO 2002: 272-287
-
Proc. of CRYPTO 2002
, pp. 272-287
-
-
Cramer, R.1
Fehr, S.2
-
9
-
-
33745847836
-
Black-box secret sharing from primitve sets in algebraic number fields
-
Springer Verlag LNCS
-
Cramer, Fehr and Stam: Black-Box Secret Sharing from Primitve Sets in Algebraic Number Fields, Proc. of Crypto 05, Springer Verlag LNCS.
-
Proc. of Crypto 05
-
-
Cramer, F.1
Stam2
-
10
-
-
24144467818
-
Efficient threshold RSA signatures with general moduli and no extra assumptions
-
Ivan Damgård, Kasper Dupont: Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. Proc. of Public Key Cryptography 2005: 346-361
-
Proc. of Public Key Cryptography 2005
, pp. 346-361
-
-
Damgård, I.1
Dupont, K.2
-
11
-
-
84858917439
-
Non-interactive zero-knowledge proofs from homomorphic encryption
-
Springer Verlag LNCS
-
Damgård, Fazio and Nicolosi: Non-Interactive Zero-Knowledge Proofs from Homomorphic Encryption Proc. of TCC 06, Springer Verlag LNCS.
-
Proc. of TCC 06
-
-
Damgård, F.1
Nicolosi2
-
12
-
-
84945127249
-
Practical threshold RSA signatures without a trusted dealer
-
Ivan Damgård, Maciej Koprowski: Practical Threshold RSA Signatures without a Trusted Dealer. Proc. of EUROCRYPT 2001: 152-165
-
Proc. of EUROCRYPT 2001
, pp. 152-165
-
-
Damgård, I.1
Koprowski, M.2
-
13
-
-
0000527282
-
Perfect homomorphic zero-knowledge threshold schemes over any finite abelian group
-
Yvo Desmedt, Yair Frankel: Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group. SIAM J. Discrete Math. 7(4): 667-679 (1994)
-
(1994)
SIAM J. Discrete Math.
, vol.7
, Issue.4
, pp. 667-679
-
-
Desmedt, Y.1
Frankel, Y.2
-
16
-
-
0038425881
-
Robust and efficient sharing of RSA functions
-
Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, and Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 2000 13(2): 273-300
-
J. Cryptology 2000
, vol.13
, Issue.2
, pp. 273-300
-
-
Gennaro, R.1
Rabin, T.2
Jarecki, S.3
Krawczyk, H.4
-
17
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems 3
-
Oded Goldreich, Silvio Micali, Avi Wigderson: Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems 3. ACM 38(3): 691-729 (1991).
-
(1991)
ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
Tal Rabin: A Simplified Approach to Threshold and Proactive RSA. Proc. of CRYPTO 1998: 89-104
-
Proc. of CRYPTO 1998
, pp. 89-104
-
-
Rabin, T.1
-
19
-
-
12344258539
-
Efficient signature generation by smart cards
-
Claus-Peter Schnorr: Efficient Signature Generation by Smart Cards. J. Cryptology 4(3): 161-174 (1991)
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
20
-
-
0018545449
-
How to share a secret. commun
-
Adi Shamir: How to Share a Secret. Commun. ACM 22(11): 612-613 (1979)
-
(1979)
ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
84948954277
-
Practical threshold signatures
-
Victor Shoup: Practical Threshold Signatures. Proc. of EUROCRYPT 2000: 207-220
-
Proc. of EUROCRYPT 2000
, pp. 207-220
-
-
Shoup, V.1
-
23
-
-
0000378392
-
Short monotone formulae for the majority function
-
Leslie G. Valiant: Short Monotone Formulae for the Majority Function. J. Algorithms 5(3): 363-366 (1984)
-
(1984)
J. Algorithms
, vol.5
, Issue.3
, pp. 363-366
-
-
Valiant, L.G.1
|