Search dblp for Publications

export results for "Threshold Cryptosystems."

 download as .bib file

@inproceedings{DBLP:conf/secrypt/Teseleanu23,
  author       = {George Teseleanu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Threshold Cryptosystems Based on 2k-th Power Residue Symbols},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {295--302},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012007600003555},
  doi          = {10.5220/0012007600003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Teseleanu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Teseleanu23a,
  author       = {George Teseleanu},
  title        = {Threshold Cryptosystems Based on 2\({}^{\mbox{k}}\)-th Power Residue
                  Symbols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/601},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Teseleanu23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DeveveyLNPY21,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Juan A. Garay},
  title        = {Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive
                  Security in the Standard Model Without Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {659--690},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_24},
  doi          = {10.1007/978-3-030-75245-3\_24},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DeveveyLNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeveveyLNPY21,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  title        = {Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive
                  Security in the Standard Model Without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/630},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DeveveyLNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ErwigFR21,
  author       = {Andreas Erwig and
                  Sebastian Faust and
                  Siavash Riahi},
  title        = {Large-Scale Non-Interactive Threshold Cryptosystems Through Anonymity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1290},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1290},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ErwigFR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LibertY20,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  title        = {Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems:
                  Generic Framework and Constructions},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1405--1441},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09350-3},
  doi          = {10.1007/S00145-020-09350-3},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LibertY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TomescuCZAPGD20,
  author       = {Alin Tomescu and
                  Robert Chen and
                  Yiming Zheng and
                  Ittai Abraham and
                  Benny Pinkas and
                  Guy Golan{-}Gueta and
                  Srinivas Devadas},
  title        = {Towards Scalable Threshold Cryptosystems},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {877--893},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00059},
  doi          = {10.1109/SP40000.2020.00059},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/TomescuCZAPGD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mukhopadhyay20,
  author       = {Debdeep Mukhopadhyay},
  title        = {Improved Fault Templates of Boolean Circuits in Cryptosystems can
                  Break Threshold Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mukhopadhyay20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-01148,
  author       = {David Yakira and
                  Ido Grayevsky and
                  Avi Asayag},
  title        = {Rational Threshold Cryptosystems},
  journal      = {CoRR},
  volume       = {abs/1901.01148},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.01148},
  eprinttype    = {arXiv},
  eprint       = {1901.01148},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-01148.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Aayush Jain and
                  Sam Kim and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {565--596},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_19},
  doi          = {10.1007/978-3-319-96884-1\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehGGJKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGGJKRS17,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Aayush Jain and
                  Sam Kim and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  title        = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/956},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGGJKRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangLX16,
  author       = {Chenchen Zhang and
                  Yuan Luo and
                  Guangtao Xue},
  title        = {A new construction of threshold cryptosystems based on {RSA}},
  journal      = {Inf. Sci.},
  volume       = {363},
  pages        = {140--153},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ins.2016.05.008},
  doi          = {10.1016/J.INS.2016.05.008},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDOP16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Sabine Oechsner and
                  Chris Peikert},
  title        = {Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with
                  Applications to Lattice-based Threshold Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/997},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SchoenmakersV15,
  author       = {Berry Schoenmakers and
                  Meilof Veeningen},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Universally Verifiable Multiparty Computation from Threshold Homomorphic
                  Cryptosystems},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_1},
  doi          = {10.1007/978-3-319-28166-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SchoenmakersV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchoenmakersV15,
  author       = {Berry Schoenmakers and
                  Meilof Veeningen},
  title        = {Universally Verifiable Multiparty Computation from Threshold Homomorphic
                  Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchoenmakersV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LibertY13,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  title        = {Adaptively secure non-interactive threshold cryptosystems},
  journal      = {Theor. Comput. Sci.},
  volume       = {478},
  pages        = {76--100},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2013.01.001},
  doi          = {10.1016/J.TCS.2013.01.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LibertY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LibertY12,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Ronald Cramer},
  title        = {Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security:
                  New Framework and Constructions},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_5},
  doi          = {10.1007/978-3-642-28914-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LibertY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LibertY11,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_1},
  doi          = {10.1007/978-3-642-34704-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LibertY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Wee11,
  author       = {Hoeteck Wee},
  editor       = {Kenneth G. Paterson},
  title        = {Threshold and Revocation Cryptosystems via Extractable Hash Proofs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {589--609},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_32},
  doi          = {10.1007/978-3-642-20465-4\_32},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Wee11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LibertY11,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Luca Aceto and
                  Monika Henzinger and
                  Jir{\'{\i}} Sgall},
  title        = {Adaptively Secure Non-interactive Threshold Cryptosystems},
  booktitle    = {Automata, Languages and Programming - 38th International Colloquium,
                  {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6756},
  pages        = {588--600},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22012-8\_47},
  doi          = {10.1007/978-3-642-22012-8\_47},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/LibertY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11i,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Threshold Homomorphic Cryptosystems},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1293--1294},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_13},
  doi          = {10.1007/978-1-4419-5906-5\_13},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BendlinD10,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd},
  editor       = {Daniele Micciancio},
  title        = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_13},
  doi          = {10.1007/978-3-642-11799-2\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BendlinD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BendlinD09,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd},
  title        = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BendlinD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/GangishettiGDS07,
  author       = {Raju Gangishetti and
                  M. Choudary Gorantla and
                  Manik Lal Das and
                  Ashutosh Saxena},
  title        = {Threshold key issuing in identity-based cryptosystems},
  journal      = {Comput. Stand. Interfaces},
  volume       = {29},
  number       = {2},
  pages        = {260--264},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.csi.2006.05.001},
  doi          = {10.1016/J.CSI.2006.05.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/GangishettiGDS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Saxena07,
  author       = {Ashutosh Saxena},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Threshold {SKI} Protocol for ID-based Cryptosystems},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {65--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.22},
  doi          = {10.1109/IAS.2007.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Saxena07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtK07,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {A Generalization and a Variant of Two Threshold Cryptosystems Based
                  on Factoring},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {351--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_23},
  doi          = {10.1007/978-3-540-75496-1\_23},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarSS06a,
  author       = {K. Phani Kumar and
                  G. Shailaja and
                  Ashutosh Saxena},
  title        = {Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarSS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/LibertQ03,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Efficient revocation and threshold pairing based cryptosystems},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {163--171},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872059},
  doi          = {10.1145/872035.872059},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/LibertQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ShoupG02,
  author       = {Victor Shoup and
                  Rosario Gennaro},
  title        = {Securing Threshold Cryptosystems against Chosen Ciphertext Attack},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {2},
  pages        = {75--96},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0020-9},
  doi          = {10.1007/S00145-001-0020-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ShoupG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KatzY02,
  author       = {Jonathan Katz and
                  Moti Yung},
  editor       = {Yuliang Zheng},
  title        = {Threshold Cryptosystems Based on Factoring},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {192--205},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_12},
  doi          = {10.1007/3-540-36178-2\_12},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KatzY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Jarecki01,
  author       = {Stanislaw Jarecki},
  title        = {Efficient threshold cryptosystems},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2001},
  url          = {https://hdl.handle.net/1721.1/8370},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Jarecki01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FouqueP01,
  author       = {Pierre{-}Alain Fouque and
                  David Pointcheval},
  editor       = {Colin Boyd},
  title        = {Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_21},
  doi          = {10.1007/3-540-45682-1\_21},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FouqueP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LysyanskayaP01,
  author       = {Anna Lysyanskaya and
                  Chris Peikert},
  editor       = {Colin Boyd},
  title        = {Adaptive Security in the Threshold Setting: From Cryptosystems to
                  Signature Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {331--350},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_20},
  doi          = {10.1007/3-540-45682-1\_20},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LysyanskayaP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzY01,
  author       = {Jonathan Katz and
                  Moti Yung},
  title        = {Threshold Cryptosystems Based on Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Numao99,
  author       = {Masayuki Numao},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Periodical Multi-secret Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {363--377},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_29},
  doi          = {10.1007/978-3-540-48000-6\_29},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Numao99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiGJKR99,
  author       = {Ran Canetti and
                  Rosario Gennaro and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Michael J. Wiener},
  title        = {Adaptive Security for Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_7},
  doi          = {10.1007/3-540-48405-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiGJKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShoupG98,
  author       = {Victor Shoup and
                  Rosario Gennaro},
  editor       = {Kaisa Nyberg},
  title        = {Securing Threshold Cryptosystems against Chosen Ciphertext Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054113},
  doi          = {10.1007/BFB0054113},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShoupG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Langford96,
  author       = {Susan K. Langford},
  editor       = {Neal Koblitz},
  title        = {Weakness in Some Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {74--82},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_6},
  doi          = {10.1007/3-540-68697-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Langford96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LimL96,
  author       = {Chae Hoon Lim and
                  Pil Joong Lee},
  editor       = {T. Mark A. Lomas},
  title        = {Directed Signatures and Application to Threshold Cryptosystems},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {131--138},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_13},
  doi          = {10.1007/3-540-62494-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LimL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LaihH91,
  author       = {Chi{-}Sung Laih and
                  Lein Harn},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {Generalized Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {159--166},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_13},
  doi          = {10.1007/3-540-57332-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LaihH91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtF89,
  author       = {Yvo Desmedt and
                  Yair Frankel},
  editor       = {Gilles Brassard},
  title        = {Threshold Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {307--315},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_28},
  doi          = {10.1007/0-387-34805-0\_28},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtF89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Blakley80,
  author       = {G. R. Blakley},
  title        = {One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast
                  Key Safeguarding Schemes (Threshold Schemes) Exist},
  booktitle    = {Proceedings of the 1980 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 14-16, 1980},
  pages        = {108--113},
  publisher    = {{IEEE} Computer Society},
  year         = {1980},
  url          = {https://doi.org/10.1109/SP.1980.10016},
  doi          = {10.1109/SP.1980.10016},
  timestamp    = {Thu, 21 Sep 2023 15:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Blakley80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}