Exploració per tema "Threshold cryptography"
Ara es mostren els items 1-5 de 5
-
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems
(2012-06)
Article
Accés restringit per política de l'editorialSeveral alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ... -
Lattice-based threshold cryptography
(Universitat Politècnica de Catalunya, 2020-07)
Treball Final de Grau
Accés obertEver since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The goal of this bachelor's degree ... -
R-LWE-Based distributed key generation and threshold decryption
(Multidisciplinary Digital Publishing Institute (MDPI), 2022-02-25)
Article
Accés obertEver since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The most prominent field in ... -
RLWE-based distributed key generation and threshold decryption
(Universitat Politècnica de Catalunya, 2021-07)
Projecte Final de Màster Oficial
Accés obertEver since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The most prominent field in ... -
Signcryption schemes with threshold unsigncryption, and applications
(2014-03)
Article
Accés obertThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security and reliability in ...