Threshold cryptosystem

Results: 25



#Item
11Peer-to-peer computing / Digital signature / Threshold cryptosystem / RSA / Elliptic Curve DSA / Paillier cryptosystem / XTR / Homomorphic encryption / Digital Signature Algorithm / Cryptography / Public-key cryptography / Bitcoin

Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed] Rosario Gennaro

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-08 09:13:05
12Paillier cryptosystem / Ciphertext indistinguishability / Threshold cryptosystem / Homomorphic encryption / Private information retrieval / Secure Shell / Cryptography / Public-key cryptography / Cryptographic protocols

Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-05-22 23:40:41
13RSA / Threshold cryptosystem / Electronic voting / Digital signature / Blind signature / Damgård–Jurik cryptosystem / Cryptography / Public-key cryptography / Paillier cryptosystem

Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC ’[removed] – 29 august 2001, Newport, Rhode Island, USA) N. Shavit Ed. ACM Press, New York, pages 274–283. Practical Multi-Candidate

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:36:02
14Electronic commerce / Homomorphic encryption / ElGamal encryption / Learning with errors / Threshold cryptosystem / RSA / Semantic security / Secure multi-party computation / Cipher / Cryptography / Public-key cryptography / Cryptographic protocols

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Gilad Asharov∗ Abhishek Jain†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-11 13:30:56
15Cryptographic protocols / ElGamal encryption / Cipher / Key / Man-in-the-middle attack / RSA / Diffie–Hellman key exchange / ID-based encryption / Threshold cryptosystem / Cryptography / Public-key cryptography / Key management

Time-Lapse Cryptography Technical Report TR[removed]Michael O. Rabin∗ Christopher Thorpe

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2006-12-20 15:07:12
16File hosting / Online backup services / Cloud storage / Cryptography / Data deduplication / Memopal / Dropbox / Backup / Threshold cryptosystem / Software / Computing / Data synchronization

A Secure Data Deduplication Scheme for Cloud Storage Jan Stanek∗ , Alessandro Sorniotti† , Elli Androulaki† , and Lukas Kencl∗ Abstract. As more corporate and private users outsource their data to cloud storage p

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:17:04
17Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
18Cryptographic protocols / Threshold cryptosystem / Electronic commerce / Group signature / Secret sharing / ElGamal signature scheme / Verifiable secret sharing / Digital signature / ElGamal encryption / Cryptography / Public-key cryptography / Key management

562 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18,

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:18:45
19Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
20Key management / Proactive secret sharing / Secret sharing / RSA / Threshold cryptosystem / Verifiable secret sharing / Group signature / Digital signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Cryptographic protocols

An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:04:09
UPDATE