×

Found 3 Documents (Results 1–3)

Efficient two-party exponentiation from quotient transfer. (English) Zbl 1509.68081

Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 643-662 (2022).
MSC:  68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Dynamic threshold public-key encryption with decryption consistency from static assumptions. (English) Zbl 1358.94077

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 77-92 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Year of Publication

Main Field

Software