Lu, Yi; Hara, Keisuke; Ohara, Kazuma; Schuldt, Jacob; Tanaka, Keisuke Efficient two-party exponentiation from quotient transfer. (English) Zbl 1509.68081 Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 643-662 (2022). MSC: 68Q10 94A60 PDFBibTeX XMLCite \textit{Y. Lu} et al., Lect. Notes Comput. Sci. 13269, 643--662 (2022; Zbl 1509.68081) Full Text: DOI
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency. (English) Zbl 1403.94077 Theor. Comput. Sci. 630, 95-116 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Theor. Comput. Sci. 630, 95--116 (2016; Zbl 1403.94077) Full Text: DOI
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo Dynamic threshold public-key encryption with decryption consistency from static assumptions. (English) Zbl 1358.94077 Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 77-92 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Lect. Notes Comput. Sci. 9144, 77--92 (2015; Zbl 1358.94077) Full Text: DOI