Threshold cryptosystem

Results: 25



#Item
21Paillier cryptosystem / Ciphertext indistinguishability / Threshold cryptosystem / Homomorphic encryption / Private information retrieval / Secure Shell / Cryptography / Public-key cryptography / Cryptographic protocols

Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-04-21 13:20:55
22Trusted third party / Trusted Computing / Secure multi-party computation / Secret sharing / ACM SIGACT / Trusted timestamping / Verifiable secret sharing / Threshold cryptosystem / Secure two-party computation / Cryptography / Cryptographic protocols / Public-key cryptography

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-16 05:06:00
23Paillier cryptosystem / ElGamal encryption / Homomorphic encryption / Threshold cryptosystem / Goldwasser–Micali cryptosystem / Chosen-ciphertext attack / RSA / Semantic security / Key / Cryptography / Public-key cryptography / Electronic commerce

Author manuscript, published in "Financial Cryptography, 4th International Conference[removed]104"

Add to Reading List

Source URL: hal.inria.fr

Language: English - Date: 2011-02-11 09:14:00
24Financial cryptography / Blind signature / Peer-to-peer / Digital signature / Threshold cryptosystem / Social peer-to-peer processes / PKCS / RSA / Bootstrapping node / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-02-15 17:51:33
25Ciphertext indistinguishability / Paillier cryptosystem / Semantic security / Threshold cryptosystem / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / ElGamal encryption / RSA / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-05-19 13:27:55
UPDATE