DOI: 10.17760/d20560783
|View full text |Cite
|
Sign up to set email alerts
|

Three useful threshold cryptography problems with efficient solutions

Jack Doerner

Abstract: First and foremost, I thank my advisor, abhi shelat, who introduced me to the field of cryptography and with whom I have subsequently worked for eight years. I never considered to pursue a PhD before I met him, and only through the guidance, opportunities, funding, and freedom he provided have I now attained one. His support has been unwavering.I thank my coauthors, who contributed directly to the constituent works of this thesis: Megan Chen, Ran Cohen, Yashvanth Kondi, Eysa Lee, and Schuyler Rosefield. For th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 113 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?