2024
DOI: 10.1093/comjnl/bxae109
|View full text |Cite
|
Sign up to set email alerts
|

Game on: a performance comparison of interpolation techniques applied to Shamir’s secret sharing

Anastassis Voudouris,
Aristomenis Tressos,
Apostolis Zarras
et al.

Abstract: Public-key encryption is typically managed through a public key infrastructure. However, it relies on a central control point, the certification authority, which acts as a single point of failure. Recent technological advancements have led to the need for decentralized cryptographic protocols. This paper presents a comprehensive study on enhancing public-key encryption via threshold cryptography and multiparty computation to ensure robust security in decentralized systems. The focus lies in exploring various p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 25 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?