Secret sharing

Results: 195



#Item
91Assignment / Contract law / Equity / Landlord–tenant law / Rights / Secret sharing / Password / Algorithmic trading / Law / Financial markets / Civil law

        

Add to Reading List

Source URL: www.nii.ac.jp

Language: English - Date: 2011-06-15 04:50:06
92Cryptographic protocols / Electronic commerce / Cryptographic hash function / Key / RSA / Hash function / Secret sharing / Password / Challenge-response authentication / Cryptography / Key management / Public-key cryptography

Environmental Key Generation towards Clueless Agents James Riordan? School of Mathematics University of Minnesota Minneapolis, MN 55455

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
93Cryptography / Virtual synchrony / Consensus / State machine replication / Public-key cryptography / Verifiable secret sharing / Communications protocol / Internet Relay Chat / Computing / Fault-tolerant computer systems / Data

Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks Jonathan Kirsch1 and Brian Coan2 Johns Hopkins University, Baltimore, MD. Telcordia Technologies, Piscataway, NJ.

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
94Information / Cryptography / Secure multi-party computation / Key management / Communications protocol / Lookup table / Homomorphic encryption / Secret sharing / Transmission Control Protocol / Cryptographic protocols / Data / Computing

Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen1,2 and Sander Siim1,2 1 Cybernetica AS

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 10:34:14
95Visual cryptography / Cryptographic protocols / Key management / Digital photography / Image processing / Secret sharing / Pixel / Computing / Steganography / Cryptography / Computer graphics / Espionage

A Threshold Visual Cryptography Scheme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 11:45:43
96Secret sharing / Verifiable secret sharing / XTR / Secret sharing using the Chinese remainder theorem / Cryptography / Cryptographic protocols / Key management

An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 06:38:57
97Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Leftover hash lemma / Min-entropy / Entropy / Secret sharing / Cryptography / Applied mathematics / Theoretical computer science

Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-05 17:10:39
98Data / Password-authenticated key agreement / Password / Universal composability / OTPW / Cryptographic protocols / Cryptography / Information

Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing∗ Jan Camenisch Anna Lysyanskaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-21 10:51:23
99Commitment scheme / Proactive secret sharing / Ciphertext indistinguishability / Adversary model / Advantage / Cryptography / Cryptographic protocols / Secret sharing

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-20 03:48:31
100Secret sharing / Cipher / Symbol / Logic / Cryptography / Entailment

Extended Access Structures and Their Cryptographic Applications Vanesa Daza1 , Javier Herranz 2 , Paz Morillo3 and Carla R`afols3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-28 10:19:53
UPDATE