Adaptive Security for Threshold Cryptosystems
- 16 December 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Efficient Multiparty Computations Secure Against an Adaptive AdversaryPublished by Springer Nature ,1999
- Secure Distributed Key Generation for Discrete-Log Based CryptosystemsPublished by Springer Nature ,1999
- Concurrent zero-knowledgePublished by Association for Computing Machinery (ACM) ,1998
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptographyPublished by Association for Computing Machinery (ACM) ,1998
- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free?Published by Springer Nature ,1998
- On the Composition of Zero-Knowledge Proof SystemsSIAM Journal on Computing, 1996
- The Knowledge Complexity of Interactive Proof SystemsSIAM Journal on Computing, 1989
- Non-cryptographic fault-tolerant computing in constant number of rounds of interactionPublished by Association for Computing Machinery (ACM) ,1989
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988