Threshold cryptosystem

Results: 25



#Item
1Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1  City College, City University of New York

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
2TTP SmartCard-based ElGamal Cryptosystem using Threshold Scheme for Electronic Elections Authors: Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca UNESCO Chair in Data Privacy

TTP SmartCard-based ElGamal Cryptosystem using Threshold Scheme for Electronic Elections Authors: Jordi Pujol-Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca UNESCO Chair in Data Privacy

Add to Reading List

Source URL: fps2011.dyndns.org

Language: English
    3Civitas: Implementation of a Threshold Cryptosystem Adam M. Davis  Dmitri Chmelev

    Civitas: Implementation of a Threshold Cryptosystem Adam M. Davis Dmitri Chmelev

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2009-08-03 10:33:09
      4An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

      An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-02-21 12:47:44
      5Secure protocols for accountable warrant execution Joshua A. Kroll  Edward W. Felten

      Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

      Add to Reading List

      Source URL: www.cs.princeton.edu

      Language: English - Date: 2014-04-02 08:24:08
      6Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

      Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon∗ Feng-Hao Liu†

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-22 14:22:01
      7RSA Threshold Cryptography H.L. Nguyen May 4, 2005 Dept. of Computer Science, University of Bristol, Merchant Venturers Building,

      RSA Threshold Cryptography H.L. Nguyen May 4, 2005 Dept. of Computer Science, University of Bristol, Merchant Venturers Building,

      Add to Reading List

      Source URL: www.cs.ox.ac.uk

      Language: English - Date: 2013-06-06 21:32:07
      8942  JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical

      942 JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2013-08-05 10:54:48
      9Secure protocols for accountable warrant execution Joshua A. Kroll  Edward W. Felten

      Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

      Add to Reading List

      Source URL: www.cs.princeton.edu

      Language: English - Date: 2014-04-02 08:24:08
      10Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

      Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-01 19:43:29