Skip to search formSkip to main contentSkip to account menu

Threshold cryptosystem

Known as: Threshold, Threshold encryption 
In cryptography, a cryptosystem is called a "threshold cryptosystem", if in order to decrypt an encrypted message, several parties (more than some… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Threshold cryptography schemes are described with application to the Ed25519, Ed448, X25519 and X448 Elliptic Curves. Threshold… 
2018
2018
We present Helix, a Byzantine fault tolerant and scalable consensus algorithm for fair ordering of transactions among nodes in a… 
2012
2012
With the increasing popularity of the cloud, clients oursource their data to clouds in order to take advantage of unlimited… 
2010
2010
Network intrusion detection systems (NIDSs) play a key role in defending modern network computing environments against attacks… 
2008
2008
This paper describes the implementation of a threshold cryptosystem for Civitas, a secure electronic voting system. The… 
2008
2008
Progressing towards an era of ever more small devices with computational power and storage capabilities, a new kind of security… 
2008
2008
In this paper, we use SPIN, a model checker for LTL, to detect vulnerabilities in the AACS drive-host authentication protocol… 
2002
2002
Undeniable signature is an intriguing concept introduced by Chaum and Antwerpen at Crypto’89. In 1999, Lee and Hwang presented…