Secret sharing

Results: 195



#Item
121APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-16 17:01:48
122Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel1 , Tamir Tassa1,2 , and Enav Weinreb1 1 2

Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel1 , Tamir Tassa1,2 , and Enav Weinreb1 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
123Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-07 04:07:04
124Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes Nuttapong Attrapadung, Kazukuni Kobara, and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of Tokyo 4-

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes Nuttapong Attrapadung, Kazukuni Kobara, and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of Tokyo 4-

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
125Parallel Multi-Party Computation from Linear Multi-Secret Sharing Schemes ? Zhifang Zhang1 , Mulan Liu1?? , and Liangliang Xiao2 1  Academy of Mathematics and Systems Science, Key Laboratory of Mathematics

Parallel Multi-Party Computation from Linear Multi-Secret Sharing Schemes ? Zhifang Zhang1 , Mulan Liu1?? , and Liangliang Xiao2 1 Academy of Mathematics and Systems Science, Key Laboratory of Mathematics

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
126Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ? Jan Camenisch1 , Robert R. Enderlein1,2 , and Gregory Neven1 {jca,enr,nev}@zurich.ibm.com 1 2

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ? Jan Camenisch1 , Robert R. Enderlein1,2 , and Gregory Neven1 {jca,enr,nev}@zurich.ibm.com 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-05 05:22:56
127An Alternative to Fixed-Key Based Pre-Indexing Joel C. Frank • Shayna M. Frank • Thomas M. Kroeger
 Ethan L. Miller • Darrell D. E. Long  Center for Research in Storage Systems

An Alternative to Fixed-Key Based Pre-Indexing Joel C. Frank • Shayna M. Frank • Thomas M. Kroeger
 Ethan L. Miller • Darrell D. E. Long Center for Research in Storage Systems"

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2014-09-25 12:21:50
128Labour law / Non-disclosure agreement / Information / Trade secret / Security / Proprietary software / Document / Intellectual property law / Law / Information sensitivity

NDA FAQs What is an NDA? A non-disclosure agreement (NDA) (also known as confidentiality agreement, CA, confidential disclosure agreement, CDA), is a legally-binding contract which governs the sharing of information be

Add to Reading List

Source URL: www.hhsresearchadmin.ca

Language: English - Date: 2014-07-17 08:33:55
129WHO AM I? The web of life … with a twist! Source: Various, including - Cornell, Joseph[removed]Sharing Nature with Children. Nevada City, CA: Dawn Publications. Basic Description: Each player is assigned a secret spec

WHO AM I? The web of life … with a twist! Source: Various, including - Cornell, Joseph[removed]Sharing Nature with Children. Nevada City, CA: Dawn Publications. Basic Description: Each player is assigned a secret spec

Add to Reading List

Source URL: www.bgci.org

Language: English - Date: 2008-11-06 10:53:46
130The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-09 06:11:33