Toggle navigation
AIX BLOG
Home
About
Tags
Tags
keep hungry keep foolish
MPC
NIZK
Lattic
Crypto
Secret Sharing
Discrete Mathematics
PVMSS
non-interactive
Threshold Encryption
ZK proof
VSS
PVSS
ElGamal
DDL
DLEQ
Pairing
MPC
Turning HATE Into LOVE | Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
Homogeneous Liner Recursions
How to share a secret, infinitely
A (t,n) multi-secret sharing scheme
RAMP Scheme
Summarize of ZJU Crypto School
Secret Sharing Homomorphisms Keeping Shares of a Secret Secret
NIZK
Summarize of ZJU Crypto School
Lattic
Summarize of ZJU Crypto School
Crypto
Summarize of ZJU Crypto School
Secret Sharing
Public Verifiability from Pairings in Secret Sharing Schemes
A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting
Publicly Verifiable Secret Sharing
VSS from Distributed ZK Proofs and Applications
Turning HATE Into LOVE | Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
Homogeneous Liner Recursions
How to share a secret, infinitely
A (t,n) multi-secret sharing scheme
Discrete Mathematics
Homogeneous Liner Recursions
PVMSS
A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
non-interactive
A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
Threshold Encryption
Turning HATE Into LOVE | Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
ZK proof
VSS from Distributed ZK Proofs and Applications
VSS
VSS from Distributed ZK Proofs and Applications
PVSS
Public Verifiability from Pairings in Secret Sharing Schemes
A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting
Publicly Verifiable Secret Sharing
ElGamal
A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting
Publicly Verifiable Secret Sharing
DDL
Publicly Verifiable Secret Sharing
DLEQ
A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting
Pairing
Public Verifiability from Pairings in Secret Sharing Schemes