Back to Results
First PageMeta Content
Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption


To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold
Add to Reading List

Document Date: 2014-05-09 19:28:02


Open Document

File Size: 377,55 KB

Share Result on Facebook

City

Authenticated / Technicolor / Paris / /

Company

APPENDIX A. GROTH-SAHAI NON-INTERACTIVE PROOF SYSTEMS / M. Franklin / Oxford University Press / R. Gennaro / Columbia U. New York / /

Country

France / /

Currency

pence / USD / /

/

Event

Product Issues / Judicial Event / /

IndustryTerm

distributed public-key systems / composable protocols / actual systems / distributed signing protocol / multiparty computation protocols / non-interactive proof systems / reconstruction algorithm / distributed systems / distributed key generation protocol / randomized algorithm / online conversation / distributed storage systems / cryptographic services / deterministic algorithm / proof systems / Secure applications / signature systems / logarithm-based systems / partial verification algorithm / /

Organization

Oxford University / Computer Systems Organization / /

Person

Katz / Yung Technicolor Palo Alto / Ai / Pi / T. Rabin / P RSA / Pj / Benoît Libert / /

Position

faulty player / trusted dealer / first author / General / player / author / disqualified player / /

Product

Franklin / Pi / sender Pj / player / players / /

ProvinceOrState

Pi / /

PublishedMedium

Cryptology ePrint Archive / Theoretical Computer Science / /

Technology

Storage Technologies / DKG protocol / distributed signing protocol / Data encryption / identity-based encryption / ESA / private key / universally composable protocols / secret key / threshold homomorphic encryption / dual system encryption / encryption / cryptography / PPT algorithm / public key / distributed key generation protocol / partial verification algorithm / deterministic algorithm / possibly randomized algorithm / multiparty computation protocols / simulation / reconstruction algorithm / digital signature / LHSPS signing algorithm / interactive protocol / /

URL

http /

SocialTag