Back to Results
First PageMeta Content
Commitment scheme / Proactive secret sharing / Ciphertext indistinguishability / Adversary model / Advantage / Cryptography / Cryptographic protocols / Secret sharing


The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗
Add to Reading List

Document Date: 2007-08-20 03:48:31


Open Document

File Size: 294,27 KB

Share Result on Facebook

City

Davis / CSS / La Jolla / /

Company

IBM / Cleversafe Corporation / Security First Corporation / CBC / /

Country

Thailand / United States / /

/

Event

FDA Phase / /

Facility

Chiang Mai University / University of California at Davis / University of California / /

IndustryTerm

or analyze any fundamentally new protocol / secure and reliable distributed informationstorage systems / probabilistic algorithm / information dispersal algorithms / important efficiency-accounting consequences / cryptographic protocols / storage systems / candidate solution / deterministic algorithm / computing / information-dispersal algorithm / /

Organization

Faculty of Science / NSS-PR0 / PSS / U.S. Securities and Exchange Commission / University of California at San Diego / Chiang Mai University / NSS-PR1 NSS-PR2 / Department of Computer Science / Department of Computer Science & Engineering / /

Person

Rabin / Phillip Rogaway† August / /

Position

indicated player / player / good player / uncorrupted player / standard model / assuming just ind1-secure encryption / corrupted player / dealer / /

Product

ECCs / IDAs / X1 / HK2 / HK1 / /

ProvinceOrState

Indiana / Oregon / California / /

Technology

Share algorithm / modified protocol / ind1 encryption / Setup algorithm / ind1-secure encryption / CSS protocol / existing protocol / probabilistic algorithm / encryption / possibly probabilistic algorithm / cryptography / information-dispersal algorithm / deterministic algorithm / information dispersal algorithms / 1 protocol / RCSS protocol / 1993 protocol / Recover algorithms / digital signature / 0 encryption / /

URL

http /

SocialTag