DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Threshold cryptosystem
Threshold cryptosystem
Draft NISTIR 8214, Threshold Schemes for Cryptographic Primitives
Securing Threshold Cryptosystems Against Chosen Ciphertext Attack∗
A Length-Flexible Threshold Cryptosystem with Applications Basic Research in Computer Science
Implementation of a Threshold Cryptosystem
An Approach to Identity Management in Clouds Without Trusted Third Parties Akram Y
Eurocrypt'2000 Conference Report
An Improvement of Verisign's Key Roaming Service Protocol
A Threshold Cryptosystem Without a Trusted Party (Extended Abstract)
Weaknesses in Some Threshold Cryptosystems
Distributed Key Generation in the Wild
Distributed Threshold Certificate Based Encryption Scheme with No Trusted Dealer
Lecture Notes in Computer Science 3329 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
Towards Scalable Threshold Cryptosystems
Fully Distributed Non-Interactive Adaptively-Secure Threshold Signature Scheme with Short Shares: Efficiency Considerations and Implementation?
Threshold Cryptosystem for Data Signing
A Survey on Key Management of Identity-Based Schemes in Mobile Ad Hoc Networks
7 Distributed Cryptography
Distributed Key Generation and Its Applications
Top View
Design and Analysis of Cryptographic Algorithms for Authentication
Survey on Different Techniques of Threshold Cryptography
Here Called Multiple Encryption, to Enhance Its Security
Threshold Schemes from Isogeny Assumptions
Asynchronous Distributed Key Generation for Computationally- Secure Randomness, Consensus, and Threshold Signatures
Aggregatable Distributed Key Generation
An Efficient Threshold Public Key Cryptosystem Secure Against
Threshold Schemes for Cryptographic Primitives Challenges and Opportunities in Standardization and Validation of Threshold Cryptography
Signal Processing in the Encrypted Domain
CN02-2: Multiple-Key Cryptography-Based Distributed
Arxiv:2106.07831V1 [Cs.CR] 15 Jun 2021 Communication Complexity (Backes Et Al., CT-RSA’ 2013) Has to Rely on a Private Setup
Threshold Cryptosystems Based on Factoring
Key Management Using Certificateless Public Key
Secure Two-Party Threshold ECDSA from ECDSA Assumptions
ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I)
Applications of Structure-Preserving Cryptography and Pairing-Based NIZK Proofs
Online Identity Theft and Its Prevention Using Threshold Cryptography
A Multiparty Computation Approach to Threshold ECDSA
Certification-Based Trust Models in Mobile Ad Hoc Networks: a Survey and Taxonomy Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Security in Communication Networks
An Efficient and Secure Weighted Threshold Signcryption Scheme 1523
Comparison of RSA-Threshold Cryptography and ECC-Threshold Cryptography for Small Mobile Adhoc Networks