-
1
-
-
82955239611
-
Computational verifiable secret sharing revisited
-
Backes, M., Kate, A., Patra, A.: Computational Verifiable Secret Sharing Revisited. Cryptology ePrint Archive, Report 2011/281(2011)
-
(2011)
Cryptology EPrint Archive, Report 2011/281
-
-
Backes, M.1
Kate, A.2
Patra, A.3
-
3
-
-
0038687710
-
Asynchronous verifiable secret sharing and proactive cryptosystems
-
Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems. In: ACM CCS 2002, pp. 88-97(2002)
-
(2002)
ACM CCS 2002
, pp. 88-97
-
-
Cachin, C.1
Kursawe, K.2
Lysyanskaya, A.3
Strobl, R.4
-
6
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. In: IEEE FOCS 1985, pp. 383-395(1985) (Pubitemid 16541437)
-
(1985)
Annual Symposium on Foundations of Computer Science (Proceedings)
, pp. 383-395
-
-
Choc, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
7
-
-
84958760787
-
On unconditionally secure robust distributed key distribution centers
-
Zheng, Y. ed., Springer, Heidelberg
-
D'Arco, P., Stinson, D. R.: On Unconditionally Secure Robust Distributed Key Distribution Centers. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 346-363. Springer, Heidelberg (2002)
-
(2002)
ASIACRYPT 2002. LNCS
, vol.2501
, pp. 346-363
-
-
D'Arco, P.1
Stinson, D.R.2
-
8
-
-
0027341860
-
Perfectly secure message transmission
-
Dolev, D., Dwork, C., Waarts, O., Yung, M.: Perfectly secure message transmission. J. ACM 40(1), 17-47(1993)
-
(1993)
J. ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
10
-
-
33745550878
-
Round-optimal and efficient verifiable secret sharing
-
DOI 10.1007/11681878-17, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Fitzi, M., Garay, J. A., Gollakota, S., Rangan, C. P., Srinathan, K.: Round-Optimal and Efficient Verifiable Secret Sharing. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 329-342. Springer, Heidelberg (2006) (Pubitemid 43979856)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3876
, pp. 329-342
-
-
Fitzi, M.1
Garay, J.2
Gollakota, S.3
Rangan, C.P.4
Srinathan, K.5
-
11
-
-
0034830283
-
The round complexity of verifiable secret sharing and secure multicast
-
Gennaro, R., Ishai, Y., Kushilevitz, E., Rabin, T.: The round complexity of verifiable secret sharing and secure multicast. In: ACM STOC 2001, pp. 580-589(2001) (Pubitemid 32865774)
-
(2001)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 580-589
-
-
Gennaro, R.1
Ishai, Y.2
Kushilevitz, E.3
Rabin, T.4
-
12
-
-
33846862213
-
Secure distributed key generation for discrete-log based cryptosystems
-
DOI 10.1007/s00145-006-0347-3
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. of Cryptology 20(1), 51-83(2007) (Pubitemid 46224826)
-
(2007)
Journal of Cryptology
, vol.20
, Issue.1
, pp. 51-83
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
0031628398
-
Simplified VSS and fact-track multiparty computations with applications to threshold cryptography
-
Gennaro, R., Rabin, M. O., Rabin, T.: Simplified VSS and Fact-Track Multiparty Computations with Applications to Threshold Cryptography. In: ACM PODC 1998, pp. 101-111(1998)
-
(1998)
ACM PODC 1998
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
14
-
-
0000108216
-
How to construct constant-round zero-knowledge proof systems for NP
-
Goldreich, O., Kahan, A.: How to Construct Constant-Round Zero-Knowledge Proof Systems for NP. J. Cryptology 9(3), 167-190(1996)
-
(1996)
J. Cryptology
, vol.9
, Issue.3
, pp. 167-190
-
-
Goldreich, O.1
Kahan, A.2
-
15
-
-
71149116146
-
Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems. J. ACM 38(3), 691-729(1991)
-
(1991)
J. ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
0037519332
-
Practical and provably-secure commitment schemes from collision-free hashing
-
Advances in Cryptology - CRYPTO '96
-
Halevi, S., Micali, S.: Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 201-215. Springer, Heidelberg (1996) (Pubitemid 126106241)
-
(1996)
Lecture Notes in Computer Science
, Issue.1109
, pp. 201-215
-
-
Halevi, S.1
Micali, S.2
-
18
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Coppersmith, D. ed., Springer, Heidelberg
-
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339-352. Springer, Heidelberg (1995)
-
(1995)
CRYPTO 1995. LNCS
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
20
-
-
49049095073
-
Improving the round complexity of VSS in point-to-point networks
-
Aceto, L., Damgård, I., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A., Walukiewicz, I. eds., Springer, Heidelberg
-
Katz, J., Koo, C.-Y., Kumaresan, R.: Improving the Round Complexity of VSS in Point-to-Point Networks. In: Aceto, L., Damgård, I., Goldberg, L. A., Halldórsson, M. M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 499-510. Springer, Heidelberg (2008)
-
(2008)
ICALP 2008, Part II. LNCS
, vol.5126
, pp. 499-510
-
-
Katz, J.1
Koo, C.-Y.2
Kumaresan, R.3
-
21
-
-
78650823137
-
The round complexity of verifiable secret sharing: The statistical case
-
Abe, M. ed., Springer, Heidelberg
-
Kumaresan, R., Patra, A., Rangan, C. P.: The Round Complexity of Verifiable Secret Sharing: The Statistical Case. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 431-447. Springer, Heidelberg (2010)
-
(2010)
ASIACRYPT 2010. LNCS
, vol.6477
, pp. 431-447
-
-
Kumaresan, R.1
Patra, A.2
Rangan, C.P.3
-
22
-
-
0141544069
-
Perfect zero-knowledge arguments for NP using any one-way permutation
-
Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M.: Perfect Zero-Knowledge Arguments for P Using Any One-Way Permutation. J. Cryptology 11(2), 87-108(1998) (Pubitemid 128728046)
-
(1998)
Journal of Cryptology
, vol.11
, Issue.2
, pp. 87-108
-
-
Naor, M.1
-
23
-
-
70350348919
-
The round complexity of verifiable secret sharing revisited
-
Halevi, S. ed., Springer, Heidelberg
-
Patra, A., Choudhary, A., Rabin, T., Rangan, C. P.: The Round Complexity of Verifiable Secret Sharing Revisited. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 487-504. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 487-504
-
-
Patra, A.1
Choudhary, A.2
Rabin, T.3
Rangan, C.P.4
-
24
-
-
70350627331
-
Efficient asynchronous byzantine agreement with optimal resilience
-
Patra, A., Choudhary, A., Rangan, C. P.: Efficient Asynchronous Byzantine Agreement with Optimal Resilience. In: ACM PODC 2009, pp. 92-101(2009)
-
(2009)
ACM PODC 2009
, pp. 92-101
-
-
Patra, A.1
Choudhary, A.2
Rangan, C.P.3
-
25
-
-
78149273742
-
Efficient statistical asynchronous verifiable secret sharing with optimal resilience
-
Kurosawa, K. ed., Springer, Heidelberg
-
Patra, A., Choudhary, A., Rangan, C. P.: Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience. In: Kurosawa, K. (ed.) Information Theoretic Security. LNCS, vol. 5973, pp. 74-92. Springer, Heidelberg (2010)
-
(2010)
Information Theoretic Security. LNCS
, vol.5973
, pp. 74-92
-
-
Patra, A.1
Choudhary, A.2
Rangan, C.P.3
-
26
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Davies, D. W. ed., Springer, Heidelberg
-
Pedersen, T. P.: A Threshold Cryptosystem Without a Trusted Party. In: Davies, D. W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522-526. Springer, Heidelberg (1991)
-
(1991)
EUROCRYPT 1991. LNCS
, vol.547
, pp. 522-526
-
-
Pedersen, T.P.1
-
27
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum, J. ed., Springer, Heidelberg
-
Pedersen, T. P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
CRYPTO 1991. LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
28
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority (extended abstract)
-
Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract). In: ACM STOC 1989, pp. 73-85(1989)
-
(1989)
ACM STOC 1989
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
29
-
-
78651405496
-
MPSS: Mobile proactive secret sharing
-
Schultz, D. A., Liskov, B., Liskov, M.: MPSS: Mobile Proactive Secret Sharing. ACM Trans. Inf. Syst. Secur. 13(4), 34(2010)
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.4
, pp. 34
-
-
Schultz, D.A.1
Liskov, B.2
Liskov, M.3
-
30
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612-613(1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
27644508954
-
APSS: Proactive secret sharing in asynchronous systems
-
DOI 10.1145/1085126.1085127
-
Zhou, L., Schneider, F. B., van Renesse, R.: APSS: Proactive Secret Sharing in Asynchronous Systems. ACM Trans. Inf. Syst. Secur. 8(3), 259-286(2005) (Pubitemid 43906386)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.3
, pp. 259-286
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|