Back to Results
First PageMeta Content
Secret sharing / Proactive secret sharing / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Key management


Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian ∗ Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton, Florida, USA mnojoumia
Add to Reading List

Document Date: 2015-04-28 10:57:06


Open Document

File Size: 160,90 KB

Share Result on Facebook

City

Raton / Boca Raton / Shamir / /

Company

AFIPS Press / Simmons / /

Country

United States / Canada / /

Currency

pence / /

/

Facility

University of Waterloo / Florida Atlantic University / Stinson’s College of Engineering / Computer Science University of Waterloo Waterloo / /

IndustryTerm

enrollment protocol / generation networking / hierarchical secret sharing protocol / disjunctive and conjunctive multilevel secret sharing protocols / use polynomial production protocol / above protocol / threshold increase protocol / polynomial production protocol / /

Organization

Department of Computer Science / David R. Cheriton School / Stinson’s College of Engineering and Computer Science / University of Waterloo / Department of Computer and Electrical Engineering / Computer Science University of Waterloo Waterloo / Florida Atlantic University / /

Person

M. O. Rabin / Pi / T. Rabin / Douglas R. Stinson / Pj / Pk / R. Gennaro / /

Position

president and vice president / i.e. / / dealer / player / president and vice president / Corresponding author / president and vice president / ministers and senators / /

ProgrammingLanguage

FL / /

ProvinceOrState

Florida / /

PublishedMedium

Communications of the ACM / /

Technology

use polynomial production protocol / disjunctive and conjunctive multilevel secret sharing protocols / cryptography / Shamir-based threshold increase protocol / enrollment protocol / above protocol / system technologies / hierarchical secret sharing protocol / Sequential Secret Sharing Protocol / Third protocol / polynomial production protocol / Passive Adversary Model Second protocol / /

SocialTag