default search action
Search dblp for Publications
export results for "Threshold Cryptosystems."
@inproceedings{DBLP:conf/secrypt/Teseleanu23, author = {George Teseleanu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Threshold Cryptosystems Based on 2k-th Power Residue Symbols}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {295--302}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012007600003555}, doi = {10.5220/0012007600003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Teseleanu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Teseleanu23a, author = {George Teseleanu}, title = {Threshold Cryptosystems Based on 2\({}^{\mbox{k}}\)-th Power Residue Symbols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2023}, url = {https://eprint.iacr.org/2023/601}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Teseleanu23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DeveveyLNPY21, author = {Julien Devevey and Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Juan A. Garay}, title = {Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {659--690}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_24}, doi = {10.1007/978-3-030-75245-3\_24}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DeveveyLNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeveveyLNPY21, author = {Julien Devevey and Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, title = {Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2021}, url = {https://eprint.iacr.org/2021/630}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DeveveyLNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ErwigFR21, author = {Andreas Erwig and Sebastian Faust and Siavash Riahi}, title = {Large-Scale Non-Interactive Threshold Cryptosystems Through Anonymity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1290}, year = {2021}, url = {https://eprint.iacr.org/2021/1290}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ErwigFR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LibertY20, author = {Beno{\^{\i}}t Libert and Moti Yung}, title = {Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1405--1441}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09350-3}, doi = {10.1007/S00145-020-09350-3}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LibertY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TomescuCZAPGD20, author = {Alin Tomescu and Robert Chen and Yiming Zheng and Ittai Abraham and Benny Pinkas and Guy Golan{-}Gueta and Srinivas Devadas}, title = {Towards Scalable Threshold Cryptosystems}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {877--893}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00059}, doi = {10.1109/SP40000.2020.00059}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/TomescuCZAPGD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mukhopadhyay20, author = {Debdeep Mukhopadhyay}, title = {Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2020}, url = {https://eprint.iacr.org/2020/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mukhopadhyay20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-01148, author = {David Yakira and Ido Grayevsky and Avi Asayag}, title = {Rational Threshold Cryptosystems}, journal = {CoRR}, volume = {abs/1901.01148}, year = {2019}, url = {http://arxiv.org/abs/1901.01148}, eprinttype = {arXiv}, eprint = {1901.01148}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-01148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {565--596}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_19}, doi = {10.1007/978-3-319-96884-1\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehGGJKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGGJKRS17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2017}, url = {http://eprint.iacr.org/2017/956}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGGJKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangLX16, author = {Chenchen Zhang and Yuan Luo and Guangtao Xue}, title = {A new construction of threshold cryptosystems based on {RSA}}, journal = {Inf. Sci.}, volume = {363}, pages = {140--153}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2016.05.008}, doi = {10.1016/J.INS.2016.05.008}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhangLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDOP16, author = {Carsten Baum and Ivan Damg{\aa}rd and Sabine Oechsner and Chris Peikert}, title = {Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2016}, url = {http://eprint.iacr.org/2016/997}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchoenmakersV15, author = {Berry Schoenmakers and Meilof Veeningen}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {3--22}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_1}, doi = {10.1007/978-3-319-28166-7\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchoenmakersV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchoenmakersV15, author = {Berry Schoenmakers and Meilof Veeningen}, title = {Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2015}, url = {http://eprint.iacr.org/2015/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchoenmakersV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LibertY13, author = {Beno{\^{\i}}t Libert and Moti Yung}, title = {Adaptively secure non-interactive threshold cryptosystems}, journal = {Theor. Comput. Sci.}, volume = {478}, pages = {76--100}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2013.01.001}, doi = {10.1016/J.TCS.2013.01.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LibertY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LibertY12, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Ronald Cramer}, title = {Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {75--93}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_5}, doi = {10.1007/978-3-642-28914-9\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LibertY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LibertY11, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {1--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_1}, doi = {10.1007/978-3-642-34704-7\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LibertY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wee11, author = {Hoeteck Wee}, editor = {Kenneth G. Paterson}, title = {Threshold and Revocation Cryptosystems via Extractable Hash Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {589--609}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_32}, doi = {10.1007/978-3-642-20465-4\_32}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wee11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LibertY11, author = {Beno{\^{\i}}t Libert and Moti Yung}, editor = {Luca Aceto and Monika Henzinger and Jir{\'{\i}} Sgall}, title = {Adaptively Secure Non-interactive Threshold Cryptosystems}, booktitle = {Automata, Languages and Programming - 38th International Colloquium, {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6756}, pages = {588--600}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22012-8\_47}, doi = {10.1007/978-3-642-22012-8\_47}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/LibertY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11i, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Threshold Homomorphic Cryptosystems}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1293--1294}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_13}, doi = {10.1007/978-1-4419-5906-5\_13}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BendlinD10, author = {Rikke Bendlin and Ivan Damg{\aa}rd}, editor = {Daniele Micciancio}, title = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {201--218}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_13}, doi = {10.1007/978-3-642-11799-2\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BendlinD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BendlinD09, author = {Rikke Bendlin and Ivan Damg{\aa}rd}, title = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2009}, url = {http://eprint.iacr.org/2009/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BendlinD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/GangishettiGDS07, author = {Raju Gangishetti and M. Choudary Gorantla and Manik Lal Das and Ashutosh Saxena}, title = {Threshold key issuing in identity-based cryptosystems}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {260--264}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.001}, doi = {10.1016/J.CSI.2006.05.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/GangishettiGDS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Saxena07, author = {Ashutosh Saxena}, editor = {Ning Zhang and Ajith Abraham}, title = {Threshold {SKI} Protocol for ID-based Cryptosystems}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {65--70}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.22}, doi = {10.1109/IAS.2007.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/Saxena07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtK07, author = {Yvo Desmedt and Kaoru Kurosawa}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {351--361}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_23}, doi = {10.1007/978-3-540-75496-1\_23}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/DesmedtK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarSS06a, author = {K. Phani Kumar and G. Shailaja and Ashutosh Saxena}, title = {Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2006}, url = {http://eprint.iacr.org/2006/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarSS06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/LibertQ03, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Efficient revocation and threshold pairing based cryptosystems}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {163--171}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872059}, doi = {10.1145/872035.872059}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/LibertQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ShoupG02, author = {Victor Shoup and Rosario Gennaro}, title = {Securing Threshold Cryptosystems against Chosen Ciphertext Attack}, journal = {J. Cryptol.}, volume = {15}, number = {2}, pages = {75--96}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0020-9}, doi = {10.1007/S00145-001-0020-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ShoupG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KatzY02, author = {Jonathan Katz and Moti Yung}, editor = {Yuliang Zheng}, title = {Threshold Cryptosystems Based on Factoring}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {192--205}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_12}, doi = {10.1007/3-540-36178-2\_12}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KatzY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Jarecki01, author = {Stanislaw Jarecki}, title = {Efficient threshold cryptosystems}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2001}, url = {https://hdl.handle.net/1721.1/8370}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Jarecki01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FouqueP01, author = {Pierre{-}Alain Fouque and David Pointcheval}, editor = {Colin Boyd}, title = {Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {351--368}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_21}, doi = {10.1007/3-540-45682-1\_21}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FouqueP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LysyanskayaP01, author = {Anna Lysyanskaya and Chris Peikert}, editor = {Colin Boyd}, title = {Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {331--350}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_20}, doi = {10.1007/3-540-45682-1\_20}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LysyanskayaP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzY01, author = {Jonathan Katz and Moti Yung}, title = {Threshold Cryptosystems Based on Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2001}, url = {http://eprint.iacr.org/2001/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Numao99, author = {Masayuki Numao}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Periodical Multi-secret Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {363--377}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_29}, doi = {10.1007/978-3-540-48000-6\_29}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Numao99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiGJKR99, author = {Ran Canetti and Rosario Gennaro and Stanislaw Jarecki and Hugo Krawczyk and Tal Rabin}, editor = {Michael J. Wiener}, title = {Adaptive Security for Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {98--115}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_7}, doi = {10.1007/3-540-48405-1\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiGJKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShoupG98, author = {Victor Shoup and Rosario Gennaro}, editor = {Kaisa Nyberg}, title = {Securing Threshold Cryptosystems against Chosen Ciphertext Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {1--16}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054113}, doi = {10.1007/BFB0054113}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShoupG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Langford96, author = {Susan K. Langford}, editor = {Neal Koblitz}, title = {Weakness in Some Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {74--82}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_6}, doi = {10.1007/3-540-68697-5\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Langford96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LimL96, author = {Chae Hoon Lim and Pil Joong Lee}, editor = {T. Mark A. Lomas}, title = {Directed Signatures and Application to Threshold Cryptosystems}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {131--138}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_13}, doi = {10.1007/3-540-62494-5\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/LimL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LaihH91, author = {Chi{-}Sung Laih and Lein Harn}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {Generalized Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {159--166}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_13}, doi = {10.1007/3-540-57332-1\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LaihH91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtF89, author = {Yvo Desmedt and Yair Frankel}, editor = {Gilles Brassard}, title = {Threshold Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {307--315}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_28}, doi = {10.1007/0-387-34805-0\_28}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtF89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Blakley80, author = {G. R. Blakley}, title = {One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist}, booktitle = {Proceedings of the 1980 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 14-16, 1980}, pages = {108--113}, publisher = {{IEEE} Computer Society}, year = {1980}, url = {https://doi.org/10.1109/SP.1980.10016}, doi = {10.1109/SP.1980.10016}, timestamp = {Thu, 21 Sep 2023 15:57:32 +0200}, biburl = {https://dblp.org/rec/conf/sp/Blakley80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.