搜索结果: 1-5 共查到“hash proof systems”相关记录5条 . 查询时间(0.109 秒)
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
threshold cryptography two-party ECDSA
2019/5/21
ECDSA is a widely adopted digital signature standard. Unfortunately, efficient distributed variants of this primitive are notoriously hard to achieve and known solutions often require expensive zero k...
Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of implicit arguments introduced by Cramer and Shoup at Eurocrypt'02. They have found many applications since then, in particu...
Removing Erasures with Explainable Hash Proof Systems
Oblivious Transfer Password Authenticated Key Exchange Erasures
2016/1/25
An important problem in secure multi-party computation is the design of protocols that can
tolerate adversaries that are capable of corrupting parties dynamically and learning their internal states. ...
Disjunctions for Hash Proof Systems: New Constructions and Applications
Hash Proof System Non-Interactive Zero-Knowledge Proof Group Password Authenticated Key Exchange
2016/1/9
Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt’02) as a
tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found
many other appli...
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
public-key cryptography identity-based extractable hash proof
2013/2/21
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO ’10)...