Secret sharing

Results: 195



#Item
101Secure multi-party computation / Secret sharing / Finite fields / XTR / Cryptography / Cryptographic protocols / Advanced Encryption Standard

Secure Multiparty AES (full paper) Ivan Damg˚ ard and Marcel Keller Dept. of Computer Science, Aarhus University, Denmark {ivan,mkeller}@cs.au.dk

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-11 11:55:52
102Complexity classes / Cryptographic protocols / Probabilistic complexity theory / Zero-knowledge proof / Interactive proof system / IP / NP / Secret sharing / Randomized algorithm / Theoretical computer science / Computational complexity theory / Applied mathematics

From Statistical Zero Knowledge to Secret Sharing Vinod Vaikuntanathan∗ MIT CSAIL Prashant Nalini Vasudevan†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 23:55:10
103Electronic commerce / RSA / Function / Secret sharing / Secure multi-party computation / Crypt / Commitment scheme / Blinding / Cryptography / Public-key cryptography / Cryptographic protocols

Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Yury Lifshits∗ July 10, 2005 Abstract

Add to Reading List

Source URL: yury.name

Language: English - Date: 2008-11-06 22:10:32
104Secret sharing / Proactive secret sharing / Threshold cryptosystem / Communications protocol / Information-theoretic security / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 19:43:29
105Combinatorics / Abstract algebra / Permutation / Verifiable secret sharing / Advantage / Mix network / Parity of a permutation / Mathematics / Permutations / Cryptography

Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks Philippe Golle PARC [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-05-24 20:30:54
106Cryptographic protocols / Key management / Secret sharing / Time complexity / Algorithm / Polynomial / XTR / Theoretical computer science / Applied mathematics / Mathematics

Secret Shared Random Access Machine (Preliminary Version) Shlomi Dolev∗ Yin Li† March 28, 2015 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-28 08:21:27
107Cipher / ID-based encryption / Vector space / Function / Cramer–Shoup cryptosystem / Algebra / Mathematics / Cryptography

Dual System Encryption via Predicate Encodings Hoeteck Wee⋆ ENS, Paris, France Abstract. We introduce the notion of predicate encodings, an information-theoretic primitive reminiscent of linear secret-sharing that in a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 14:03:35
108Cryptographic hash function / Wireless sensor network / Cyberwarfare / Technology / Computing / Secure Data Aggregation in WSN / Cryptography / Homomorphic encryption / Secret sharing

1 Exact In-Network Aggregation with Integrity and Confidentiality Stavros Papadopoulos, Aggelos Kiayias, Dimitris Papadias Abstract—In-network aggregation reduces the energy cost of processing aggregate queries (such

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:50
109Hashing / Secret sharing / Reed–Solomon error correction / Advanced Encryption Standard / Hash function / Cryptographic hash function / Cipher / Cryptography / Error detection and correction / Cleversafe

AONT-RS: Blending Security and Performance in Dispersed Storage Systems Jason K. Resch Development Cleversafe, Inc. 222 S. Riverside Plaza, Suite 1700

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-12-17 12:27:22
110Public-key cryptography / Internet protocols / Homomorphic encryption / Secret sharing / HMAC / Encryption / Cryptographic hash function / Wireless sensor network / Database / Cryptography / Cryptographic protocols / Hashing

Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1 Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
UPDATE