Threshold cryptosystem

Results: 25



#Item
1Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
2

TTP SmartCard-based ElGamal Cryptosystem using Threshold Scheme for Electronic Elections Authors: Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca UNESCO Chair in Data Privacy

Add to Reading List

Source URL: fps2011.dyndns.org

Language: English
    3

    Civitas: Implementation of a Threshold Cryptosystem Adam M. Davis Dmitri Chmelev

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2009-08-03 10:33:09
      4Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

      An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-02-21 12:47:44
      5Cipher / Encryption / Key / Three-pass protocol / Threshold cryptosystem / Cryptography / Public-key cryptography / Ciphertext

      Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

      Add to Reading List

      Source URL: www.cs.princeton.edu

      Language: English - Date: 2014-04-02 08:24:08
      6RSA / Homomorphic encryption / Threshold cryptosystem / Ciphertext / Semantic security / Blum–Goldwasser cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

      Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-22 14:22:01
      7Digital signature / Key / Paillier cryptosystem / Prime number / Threshold cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / RSA

      RSA Threshold Cryptography H.L. Nguyen May 4, 2005 Dept. of Computer Science, University of Bristol, Merchant Venturers Building,

      Add to Reading List

      Source URL: www.cs.ox.ac.uk

      Language: English - Date: 2013-06-06 21:32:07
      8Electoral systems / Public-key cryptography / Election fraud / Electronic voting / Threshold cryptosystem / Voting system / Communications protocol / Homomorphic encryption / Electoral fraud / Cryptography / Cryptographic protocols / Information

      942 JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2013-08-05 10:54:48
      9Cipher / Encryption / Key / Three-pass protocol / Threshold cryptosystem / Cryptography / Public-key cryptography / Ciphertext

      Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

      Add to Reading List

      Source URL: www.cs.princeton.edu

      Language: English - Date: 2014-04-02 08:24:08
      10Secret sharing / Proactive secret sharing / Threshold cryptosystem / Communications protocol / Information-theoretic security / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

      Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-01 19:43:29
      UPDATE