ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring
Lecture Notes in Computer Science - Information Security
◽
10.1007/978-3-540-75496-1_23
◽
2007
◽
pp. 351-361
Author(s):
Yvo Desmedt
◽
Kaoru Kurosawa
Keyword(s):
Threshold Cryptosystems
Download Full-text
Related Documents
Cited By
References
Adaptively secure non-interactive threshold cryptosystems
Theoretical Computer Science
◽
10.1016/j.tcs.2013.01.001
◽
2013
◽
Vol 478
◽
pp. 76-100
◽
Cited By ~ 7
Author(s):
Benoît Libert
◽
Moti Yung
Keyword(s):
Threshold Cryptosystems
Download Full-text
Weaknesses in Some Threshold Cryptosystems
Advances in Cryptology — CRYPTO ’96 - Lecture Notes in Computer Science
◽
10.1007/3-540-68697-5_6
◽
1996
◽
pp. 74-82
◽
Cited By ~ 11
Author(s):
Susan K. Langford
Keyword(s):
Threshold Cryptosystems
Download Full-text
Towards Scalable Threshold Cryptosystems
2020 IEEE Symposium on Security and Privacy (SP)
◽
10.1109/sp40000.2020.00059
◽
2020
◽
Cited By ~ 1
Author(s):
Alin Tomescu
◽
Robert Chen
◽
Yiming Zheng
◽
Ittai Abraham
◽
Benny Pinkas
◽
...
Keyword(s):
Threshold Cryptosystems
Download Full-text
Verifiable threshold cryptosystems based on elliptic curve
2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003.
◽
10.1109/iccnmc.2003.1243064
◽
2004
◽
Cited By ~ 1
Author(s):
Yiliang Han
◽
Xiaoyuan Yang
◽
Jun Sun
◽
Delong Li
Keyword(s):
Elliptic Curve
◽
Threshold Cryptosystems
Download Full-text
Securing threshold cryptosystems against chosen ciphertext attack
Lecture Notes in Computer Science - Advances in Cryptology — EUROCRYPT'98
◽
10.1007/bfb0054113
◽
1998
◽
pp. 1-16
◽
Cited By ~ 107
Author(s):
Victor Shoup
◽
Rosario Gennaro
Keyword(s):
Threshold Cryptosystems
◽
Chosen Ciphertext Attack
Download Full-text
Adaptively Secure Non-interactive Threshold Cryptosystems
Automata, Languages and Programming - Lecture Notes in Computer Science
◽
10.1007/978-3-642-22012-8_47
◽
2011
◽
pp. 588-600
◽
Cited By ~ 9
Author(s):
Benoît Libert
◽
Moti Yung
Keyword(s):
Threshold Cryptosystems
Download Full-text
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
Lecture Notes in Computer Science - Advances in Cryptology – CRYPTO 2018
◽
10.1007/978-3-319-96884-1_19
◽
2018
◽
pp. 565-596
◽
Cited By ~ 24
Author(s):
Dan Boneh
◽
Rosario Gennaro
◽
Steven Goldfeder
◽
Aayush Jain
◽
Sam Kim
◽
...
Keyword(s):
Homomorphic Encryption
◽
Fully Homomorphic Encryption
◽
Threshold Cryptosystems
Download Full-text
Directed signatures and application to threshold cryptosystems
Security Protocols - Lecture Notes in Computer Science
◽
10.1007/3-540-62494-5_13
◽
1997
◽
pp. 131-138
◽
Cited By ~ 9
Author(s):
Chae Hoon Lim
◽
Pil Joong Lee
Keyword(s):
Threshold Cryptosystems
Download Full-text
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions
Journal of Cryptology
◽
10.1007/s00145-020-09350-3
◽
2020
◽
Vol 33
(4)
◽
pp. 1405-1441
Author(s):
Benoît Libert
◽
Moti Yung
Keyword(s):
Generic Framework
◽
Threshold Cryptosystems
Download Full-text
Threshold cryptosystems
Advances in Cryptology — AUSCRYPT '92 - Lecture Notes in Computer Science
◽
10.1007/3-540-57220-1_47
◽
1993
◽
pp. 1-14
◽
Cited By ~ 13
Author(s):
Yvo Desmedt
Keyword(s):
Threshold Cryptosystems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close