Threshold cryptosystem

Known as: Threshold, Threshold encryption 
In cryptography, a cryptosystem is called a "threshold cryptosystem", if in order to decrypt an encrypted message, several parties (more than some… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
We define three privacy-preserving solutions to the problem of distributing secrets between manufacturers and vendors of items… (More)
  • figure 2
Is this relevant?
2011
2011
This paper analyzed the basic principles of secret sharing in threshold cryptosystem and its superiority considering its… (More)
Is this relevant?
2008
2008
In dynamic networks with flexible memberships, group signatures and distributed signatures are an important problem. Dynamic… (More)
  • table 1
Is this relevant?
2008
2008
This paper describes the implementation of a threshold cryptosystem for Civitas, a secure electronic voting system. The… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We propose a public-key cryptosystem which is derived from the Paillier cryptosystem. The scheme inherits the attractive… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Verifiable secret sharing is an important primitive in distributed cryptography. With the growing interest in the deployment of… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Semantic security against chosen-ciphertext attacks (IND-CCA) is widely believed as the correct security level for public-key… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We introduce a new approach to multiparty computation (MPC) basing it on homomorphic threshold crypto-systems. We show that given… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the… (More)
Is this relevant?
Highly Cited
1991