Verifiable secret sharing for monotone access structures
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
How to Build Robust Shared Control Systems
Designs, Codes and Cryptography
Anonymous Statistical Survey of Attributes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Threshold Undeniable RSA Signature Scheme
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
A Forward-Secure Digital Signature Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Two-Party Generation of DSA Signatures
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Threshold Password-Authenticated Key Exchange
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Joint Encryption and Message-Efficient Secure Computation
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Cryptoanalysis of the Immunized LL Public Key Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Escrow Encryption Systems Visited: Attacks, Analysis and Designs
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Robust and Efficient Sharing of RSA Functions
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Improved Methods to Perform Threshold RSA
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Threshold Cryptosystems Based on Factoring
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Optimistic Mixing for Exit-Polls
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Adaptively-Secure Distributed Public-Key Systems
ESA '99 Proceedings of the 7th Annual European Symposium on Algorithms
An Improvement on a Practical Secret Voting Scheme
ISW '99 Proceedings of the Second International Workshop on Information Security
A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Toward Fair International Key Escrow
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Adaptive Security for the Additive-Sharing Based Proactive RSA
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Auto-recoverable Auto-certifiable Cryptosystems (A Survey)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Robust Distributed Multiplicaton with out Interaction
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
CODEX: A Robust and Secure Secret Distribution System
IEEE Transactions on Dependable and Secure Computing
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Distributing the Encryption and Decryption of a Block Cipher
Designs, Codes and Cryptography
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Implementing Trustworthy Services Using Replicated State Machines
IEEE Security and Privacy
Anonymous yet accountable access control
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
DECIDE: a scheme for decentralized identity escrow
Proceedings of the 2005 workshop on Digital identity management
Authentication based on multilayer clustering in ad hoc networks
EURASIP Journal on Wireless Communications and Networking
Generalised Cumulative Arrays in Secret Sharing
Designs, Codes and Cryptography
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Secure Node Discovery in Ad-hoc Networks and Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy and Anonymity Protection with Blind Threshold Signatures
International Journal of Electronic Commerce
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences: an International Journal
Sahnet: a secure system for ad-hoc networking using ecc
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
A survey of key evolving cryptosystems
International Journal of Security and Networks
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Identity-Based Key-Insulated Signature Without Random Oracles
Computational Intelligence and Security
Forward Secure Threshold Signature Scheme from Bilinear Pairings
Computational Intelligence and Security
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Proactive RSA with Non-interactive Signing
Financial Cryptography and Data Security
Dynamic Threshold Public-Key Encryption
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic and efficient joint encryption scheme in the plain public key model
Computers and Electrical Engineering
Privacy Preserving Computations without Public Key Cryptographic Operation
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An efficient conic curve threshold digital signature
CISST'09 Proceedings of the 3rd WSEAS international conference on Circuits, systems, signal and telecommunications
Secure Multiparty Computation for Comparator Networks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Secure Arithmetic Computation with No Honest Majority
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
A distributed E-business system based on conic curve
WSEAS Transactions on Computers
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part II
On Automatically Detecting Malicious Impostor Emails
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Practical Threshold Signatures with Linear Secret Sharing Schemes
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Fair Threshold Decryption with Semi-Trusted Third Parties
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Preserving user's privacy in web search engines
Computer Communications
Distributed Privilege Enforcement in PACS
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
PKIX Certificate Status in Hybrid MANETs
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A note on leakage-resilient authenticated key exchange
IEEE Transactions on Wireless Communications
Collusion-resistant threshold decryption
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Integration of a secure mobile payment system in a GSM/UMTS SIM smart card
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
Information Security Applications
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
Prêt à voter: a voter-verifiable voting system
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Privacy-preserving backpropagation neural network learning
IEEE Transactions on Neural Networks
Efficient multiplicative sharing schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Distributed "magic ink" signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Securing traceability of ciphertexts: towards a secure software key escrow system
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure distributed key generation for discrete-log based cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Distributed Pseudo-random functions and KDCs
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Adaptively secure threshold cryptography: introducing concurrency, removing erasures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
How to break a practical MIX and design a new one
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An improvement of VeriSign's key roaming service protocol
ICWE'03 Proceedings of the 2003 international conference on Web engineering
Improved on-line/off-line threshold signatures
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
The dark side of threshold cryptography
FC'02 Proceedings of the 6th international conference on Financial cryptography
Split-and-delegate: threshold cryptography for the masses
FC'02 Proceedings of the 6th international conference on Financial cryptography
On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A dynamic group key distribution scheme with flexible user join
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Authenticated data structures for graph and geometric searching
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Seeing through mist given a small fraction of an RSA private key
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Protecting against key escrow and key exposure in identity-based cryptosystem
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Efficient linkable ring signatures and threshold signatures from linear feedback shift register
ICA3PP'07 Proceedings of the 7th international conference on Algorithms and architectures for parallel processing
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Certificate status validation in mobile ad hoc networks
IEEE Wireless Communications
Secret interest groups (SIGs) in social networks with an implementation on Facebook
Proceedings of the 2010 ACM Symposium on Applied Computing
Secure anonymous communications with practical anonymity revocation scheme
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Practical threshold signatures without random oracles
ProvSec'07 Proceedings of the 1st international conference on Provable security
Robust threshold schemes based on the Chinese remainder theorem
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Identity-based threshold key-insulated encryption without random oracles
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Certificate issuing using proxy and threshold signatures in self-initialized ad hoc network
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
User-centric handling of identity agent compromise
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
ACM Transactions on Computer Systems (TOCS)
The use of mathematical linguistic methods in creating secret sharing threshold algorithms
Computers & Mathematics with Applications
CLUSMA: a mobile agent based clustering middleware for wireless sensor networks
Proceedings of the 7th International Conference on Frontiers of Information Technology
Grammar encoding in DNA-like secret sharing infrastructure
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Crypto topics and applications II
Algorithms and theory of computation handbook
On the insecurity of proactive RSA in the URSA mobile ad hoc network access control protocol
IEEE Transactions on Information Forensics and Security
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Fair threshold decryption with semi-trusted third parties
International Journal of Applied Cryptography
Resiliency aspects of security protocols
Proceedings of the 15th international conference on Security protocols
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Securing P2P storage with a self-organizing payment scheme
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Threshold and revocation cryptosystems via extractable hash proofs
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Adaptively secure non-interactive threshold cryptosystems
ICALP'11 Proceedings of the 38th international conference on Automata, languages and programming - Volume Part II
Non-interactive distributed encryption: a new primitive for revocable privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Password-protected secret sharing
Proceedings of the 18th ACM conference on Computer and communications security
Ideal secret sharing schemes with share selectability
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Identity-based key-insulated signature with secure key-updates
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Factoring-based proxy signature schemes with forward-security
CIS'04 Proceedings of the First international conference on Computational and Information Science
Protocols for supporting a public key infrastructure in ad hoc networks
Proceedings of the 11th international conference on Security Protocols
An ideal and robust threshold RSA
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Threshold cryptography based on asmuth-bloom secret sharing
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Multistage authentication scheme for mobile ad-hoc network using clustering mechanism
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Video surveillance: a distributed approach to protect privacy
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Anonymous authentication with optional shared anonymity revocation and linkability
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Simple threshold RSA signature scheme based on simple secret sharing
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An efficient implementation of a threshold RSA signature scheme
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
GBD threshold cryptography with an application to RSA key recovery
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Chord-PKI: A distributed trust infrastructure based on P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Chosen ciphertext secure public key threshold encryption without random oracles
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Certificate management system in MANET for ubiquitous computing
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
A strong identity based key-insulated cryptosystem
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Identity based key insulated signature
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Dropout-tolerant TTP-free mental poker
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Threshold cryptography in mobile ad hoc networks
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Further simplifications in proactive RSA signatures
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Black-box secret sharing from primitive sets in algebraic number fields
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Key escrow with tree-based access structure
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Efficient and proactive threshold signcryption
ISC'05 Proceedings of the 8th international conference on Information Security
Electronic voting: starting over?
ISC'05 Proceedings of the 8th international conference on Information Security
Separable linkable threshold ring signatures
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Cryptanalysis of a forward secure blind signature scheme with provable security
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Information-theoretically secure key-insulated multireceiver authentication codes
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Generic on-line/off-line threshold signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
DSO: dependable signing overlay
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Klein bottle routing: an alternative to onion routing and mix network
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Efficient CCA-Secure PKE from identity-based techniques
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
A method for safekeeping cryptographic keys from memory disclosure attacks
INTRUST'09 Proceedings of the First international conference on Trusted Systems
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Efficient, non-optimistic secure circuit evaluation based on the elgamal encryption
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Threshold and proactive pseudo-random permutations
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Universal custodian-hiding verifiable encryption for discrete logarithms
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Efficient threshold encryption from lossy trapdoor functions
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Generic construction of chosen ciphertext secure proxy re-encryption
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Research note: ID-based group-oriented cryptosystem and its digital signature scheme
Computer Communications
Research note: New generalized group-oriented cryptosystem based on Diffie-Hellman scheme
Computer Communications
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks
Journal of Parallel and Distributed Computing
An information aggregation scheme of multi-node in ubiquitous sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
On partial anonymity in secret sharing
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Chord-PKI: embedding a public key infrastructure into the chord overlay network
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Adaptively secure forward-secure non-interactive threshold cryptosystems
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Secret handshake scheme with request-based-revealing
Computers & Mathematics with Applications
Adaptively secure non-interactive threshold cryptosystems
Theoretical Computer Science
Distributing trusted third parties
ACM SIGACT News
Efficient integer span program for hierarchical threshold access structure
Information Processing Letters
Secure genomic testing with size- and position-hiding private substring matching
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
How to share a lattice trapdoor: threshold protocols for signatures and (H)IBE
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
On a new-member-joining-protocol design using bivariate polynomials based DKG algorithms
BICS'13 Proceedings of the 6th international conference on Advances in Brain Inspired Cognitive Systems
Sharing DSS by the Chinese Remainder Theorem
Journal of Computational and Applied Mathematics
Threshold public key encryption scheme resilient against continual leakage without random oracles
Frontiers of Computer Science: Selected Publications from Chinese Universities
Journal of Computer Security - Advances in Security for Communication Networks
Hi-index | 0.00 |