ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Threshold Cryptosystem without a Trusted Party
Advances in Cryptology — EUROCRYPT ’91 - Lecture Notes in Computer Science
◽
10.1007/3-540-46416-6_47
◽
2007
◽
pp. 522-526
◽
Cited By ~ 322
Author(s):
Torben Pryds Pedersen
Keyword(s):
Threshold Cryptosystem
Download Full-text
Related Documents
Cited By
References
Threshold Cryptosystem Based Fair Off-Line E-cash
2008 Second International Symposium on Intelligent Information Technology Application
◽
10.1109/iita.2008.87
◽
2008
◽
Cited By ~ 13
Author(s):
Xuanwu Zhou
Keyword(s):
Threshold Cryptosystem
Download Full-text
A Length-Flexible Threshold Cryptosystem with Applications
Information Security and Privacy - Lecture Notes in Computer Science
◽
10.1007/3-540-45067-x_30
◽
2003
◽
pp. 350-364
◽
Cited By ~ 49
Author(s):
Ivan Damgård
◽
Mads Jurik
Keyword(s):
Threshold Cryptosystem
Download Full-text
Simple and efficient threshold cryptosystem from the gap diffie-hellman group
GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489)
◽
10.1109/glocom.2003.1258486
◽
2005
◽
Cited By ~ 1
Author(s):
Joonsang Baek
◽
Yuliang Zheng
Keyword(s):
Diffie Hellman
◽
Threshold Cryptosystem
Download Full-text
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences
◽
10.1016/j.ins.2007.06.014
◽
2007
◽
Vol 177
(24)
◽
pp. 5620-5637
◽
Cited By ~ 19
Author(s):
Yu Long
◽
Kefei Chen
Keyword(s):
Threshold Cryptosystem
◽
Chosen Ciphertext Attack
Download Full-text
Threshold Cryptosystem and Its Application in Key Management Scheme
2008 International Symposium on Knowledge Acquisition and Modeling
◽
10.1109/kam.2008.46
◽
2008
◽
Cited By ~ 5
Author(s):
Xuanwu Zhou
◽
Xiaoyuan Yang
Keyword(s):
Key Management
◽
Management Scheme
◽
Threshold Cryptosystem
◽
Key Management Scheme
Download Full-text
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Applied Cryptography and Network Security - Lecture Notes in Computer Science
◽
10.1007/978-3-540-45203-4_8
◽
2003
◽
pp. 96-110
◽
Cited By ~ 4
Author(s):
Rui Zhang
◽
Hideki Imai
Keyword(s):
Discrete Logarithm
◽
Discrete Logarithm Problem
◽
Key Generation
◽
Threshold Cryptosystem
Download Full-text
A public-key threshold cryptosystem based on residue rings
Journal of Discrete Mathematical Sciences and Cryptography
◽
10.1080/09720529.2007.10698139
◽
2007
◽
Vol 10
(4)
◽
pp. 559-571
◽
Cited By ~ 1
Author(s):
Stephanie Deacon
◽
Eduardo Dueñez
◽
Jose Iovino
Keyword(s):
Public Key
◽
Threshold Cryptosystem
Download Full-text
Key management scheme based on (t, n) threshold cryptosystem
2008 3rd International Conference on Intelligent System and Knowledge Engineering
◽
10.1109/iske.2008.4731129
◽
2008
◽
Cited By ~ 4
Author(s):
Xuanwu Zhou
◽
Ping Wei
Keyword(s):
Key Management
◽
Management Scheme
◽
Threshold Cryptosystem
◽
Key Management Scheme
Download Full-text
Dynamic Threshold Cryptosystem without Group Manager
Network Protocols and Algorithms
◽
10.5296/npa.v1i1.161
◽
2009
◽
Vol 1
(1)
◽
Cited By ~ 6
Author(s):
Andreas Noack
◽
Stefan Spitz
Keyword(s):
Dynamic Threshold
◽
Threshold Cryptosystem
Download Full-text
Threshold cryptosystem based on multiple cryptographic assumptions
10.1063/1.5121076
◽
2019
◽
Author(s):
Nik Nadhilah Nik Mohd Yusoff
◽
Haslinda Ibrahim
◽
Mohd Saiful Adli Mohamad
Keyword(s):
Threshold Cryptosystem
◽
Cryptographic Assumptions
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close