-
1
-
-
33646833311
-
Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Abe, M., Fehr, S.: Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 317-334. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 317-334
-
-
Abe, M.1
Fehr, S.2
-
2
-
-
35048832490
-
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Palacio, A.: An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 171-188. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
3
-
-
33745655389
-
-
Boneh, D., Boyen, X., Halevi, S.: Chosen ciphertext secure public key threshold encryption without random oracles. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 226-243. Springer, Heidelberg (2006)
-
Boneh, D., Boyen, X., Halevi, S.: Chosen ciphertext secure public key threshold encryption without random oracles. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 226-243. Springer, Heidelberg (2006)
-
-
-
-
4
-
-
84957083549
-
Adaptive security for threshold cryptosystems
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Canetti, R., Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Adaptive security for threshold cryptosystems. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 98-115. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
5
-
-
85023809951
-
Threshold cryptosystems
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
6
-
-
0023538330
-
A Practical Scheme for Non-Interactive Verifiable Secret Sharing
-
Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: Proc. 28th FOCS, pp. 427-437.
-
Proc. 28th FOCS
, pp. 427-437
-
-
Feldman, P.1
-
7
-
-
49049089688
-
Secure Distributed Key Generation for Discrete-Log Based Cryptosystem
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystem, In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295-310. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
8
-
-
0035835293
-
Robust threshold DSS signatures
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold DSS signatures. Information and Computation 164(1), 54-64 (1996)
-
(1996)
Information and Computation
, vol.164
, Issue.1
, pp. 54-64
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
Pedersen, T.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522-536. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 522-536
-
-
Pedersen, T.1
-
10
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Pedersen, T.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
11
-
-
0018545449
-
How to Share a Secret
-
Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
12
-
-
1842599265
-
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
-
Shoup, V., Gennaro, R.: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. Journal of Cryptology 15, 75-96 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, pp. 75-96
-
-
Shoup, V.1
Gennaro, R.2
-
13
-
-
33646831834
-
Short Threshold Signature Schemes Without Random Oracles
-
Maitra, S, Madhavan, C.E.V, Venkatesan, R, eds, INDOCRYPT 2005, Springer, Heidelberg
-
Wang, H., Zhang, Y., Feng, D.: Short Threshold Signature Schemes Without Random Oracles. In: Maitra, S., Madhavan, C.E.V., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 297-310. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3797
, pp. 297-310
-
-
Wang, H.1
Zhang, Y.2
Feng, D.3
-
14
-
-
24944566040
-
Efficient Identity based Encryption without random oracles
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Waters, B.: Efficient Identity based Encryption without random oracles. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
|