Login / Signup
Threshold Encryption with Silent Setup.
Sanjam Garg
Dimitris Kolonelos
Guru-Vamsi Policharla
Mingyuan Wang
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
encryption algorithms
real world
security analysis
high security
threshold selection
key exchange
adaptive threshold
elliptic curve cryptography