Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,264,688 papers from all fields of science
Search
Sign In
Create Free Account
Threshold cryptosystem
Known as:
Threshold
, Threshold encryption
In cryptography, a cryptosystem is called a "threshold cryptosystem", if in order to decrypt an encrypted message, several parties (more than some…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Access structure
Broadcast encryption
Certificate authority
Ciphertext
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Threshold Key Generation and Decryption in Ed25519 and Ed448
P. Hallam-Baker
2020
Corpus ID: 213326546
Threshold cryptography schemes are described with application to the Ed25519, Ed448, X25519 and X448 Elliptic Curves. Threshold…
Expand
2018
2018
Helix : A Scalable and Fair Consensus Algorithm
Avi Asayag
,
Gad Cohen
,
+4 authors
David Yakira
2018
Corpus ID: 52035896
We present Helix, a Byzantine fault tolerant and scalable consensus algorithm for fair ordering of transactions among nodes in a…
Expand
2013
2013
A Secure Cloud Storage System from Threshold Encryption
姚川
,
许力
,
黄欣沂
2013
Corpus ID: 63420190
2012
2012
Multiparty Cloud Computation
Qingji Zheng
,
Xinwen Zhang
arXiv.org
2012
Corpus ID: 16085226
With the increasing popularity of the cloud, clients oursource their data to clouds in order to take advantage of unlimited…
Expand
2010
2010
Privacy-Preserving Discovery of Consensus Signatures
Felipe Saint-Jean
,
Jian Zhang
,
J. Feigenbaum
,
Phillip A. Porras
2010
Corpus ID: 13955479
Network intrusion detection systems (NIDSs) play a key role in defending modern network computing environments against attacks…
Expand
2008
2008
Civitas: Implementation of a Threshold Cryptosystem
Adam M. Davis
,
D. Chmelev
,
Michael R. Clarkson
2008
Corpus ID: 9550701
This paper describes the implementation of a threshold cryptosystem for Civitas, a secure electronic voting system. The…
Expand
2008
2008
Practical RSA Threshold Decryption for Things That Think
Roel Peeters
,
S. Nikova
,
B. Preneel
2008
Corpus ID: 3740980
Progressing towards an era of ever more small devices with computational power and storage capabilities, a new kind of security…
Expand
2008
2008
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol
Wen Wang
,
Dongyao Ji
Formal Techniques for (Networked and) Distributed…
2008
Corpus ID: 10192996
In this paper, we use SPIN, a model checker for LTL, to detect vulnerabilities in the AACS drive-host authentication protocol…
Expand
2006
2006
Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
V. Wei
,
Fangguo Zhang
IACR Cryptology ePrint Archive
2006
Corpus ID: 44757129
2002
2002
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
Guilin Wang
,
Jianying Zhou
,
R. Deng
IACR Cryptology ePrint Archive
2002
Corpus ID: 1386234
Undeniable signature is an intriguing concept introduced by Chaum and Antwerpen at Crypto’89. In 1999, Lee and Hwang presented…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE