Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,495,321 papers from all fields of science
Search
Sign In
Create Free Account
Threshold cryptosystem
Known as:
Threshold
, Threshold encryption
In cryptography, a cryptosystem is called a "threshold cryptosystem", if in order to decrypt an encrypted message, several parties (more than some…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Access structure
Broadcast encryption
Certificate authority
Ciphertext
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation
Avi Asayag
,
Gad Cohen
,
+4 authors
David Yakira
IACR Cryptology ePrint Archive
2018
Corpus ID: 52977776
We present Helix, a Byzantine fault tolerant and scalable consensus algorithm for fair ordering of transactions among nodes in a…
Expand
2018
2018
Helix : A Scalable and Fair Consensus Algorithm
Avi Asayag
,
Gad Cohen
,
+4 authors
David Yakira
2018
Corpus ID: 52035896
We present Helix, a Byzantine fault tolerant and scalable consensus algorithm for fair ordering of transactions among nodes in a…
Expand
2011
2011
Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks
Huaiqing Lin
,
Zhitang Li
,
Qingfeng Huang
Peer-to-Peer Networking and Applications
2011
Corpus ID: 6057631
Decentralized Peer-to-Peer (P2P) networks offer not only opportunities but also threats. Due to the autonomy, self-interest and…
Expand
2010
2010
Analysis and Improvements over DoS Attacks against IEEE 802.11i Standard
Li Wang
,
B. Srinivasan
Second International Conference on Networks…
2010
Corpus ID: 1327810
To improve the ability of system providing service when encounter malicious invasion, a new model of tolerance invasion system is…
Expand
2008
2008
Civitas: Implementation of a Threshold Cryptosystem
Adam M. Davis
,
D. Chmelev
,
Michael R. Clarkson
2008
Corpus ID: 9550701
This paper describes the implementation of a threshold cryptosystem for Civitas, a secure electronic voting system. The…
Expand
2006
2006
Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption
Hak-soo Ju
,
Daeyoub Kim
,
Dong Hoon Lee
,
Haeryong Park
,
Kilsoo Chun
Asia-Pacific Web Conference
2006
Corpus ID: 34696284
Chai, Cao and Lu first proposed an ID-based threshold decryption scheme without random oracles. Their approach is based on the…
Expand
2005
2005
Distributing the Encryption and Decryption of a Block Cipher
K. Martin
,
R. Safavi-Naini
,
Huaxiong Wang
,
P. Wild
Des. Codes Cryptogr.
2005
Corpus ID: 12868905
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes…
Expand
2005
2005
Privacy Preserving Link Analysis on Dynamic Weighted Graph
Yitao Duan
,
Jingtao Wang
,
Matthew Kam
,
J. Canny
Computational and mathematical organization…
2005
Corpus ID: 6990282
Link analysis algorithms have been used successfully on hyperlinked data to identify authoritative documents and retrieve other…
Expand
2002
2002
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
Guilin Wang
,
Jianying Zhou
,
R. Deng
IACR Cryptology ePrint Archive
2002
Corpus ID: 1386234
Undeniable signature is an intriguing concept introduced by Chaum and Antwerpen at Crypto’89. In 1999, Lee and Hwang presented…
Expand
1998
1998
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group
Y. Desmedt
,
B. King
,
W. Kishimoto
,
K. Kurosawa
Australasian Conference on Information Security…
1998
Corpus ID: 5141866
In this paper, we show an efficient (k,n) threshold secret sharing scheme over any finite Abelian group such that the size of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required