Secret sharing

Results: 195



#Item
121System software / Computing / Verifiable secret sharing / Server hardware / Secret sharing / Server / Proactive secret sharing / X Window System / Cryptographic protocols / Software / Cryptography

APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-16 17:01:48
122Topology / Dimension / Matroid / Canonical form / Ideal / Sheaf / Secret sharing / Mathematics / Abstract algebra / Matroid theory

Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel1 , Tamir Tassa1,2 , and Enav Weinreb1 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
123Secure two-party computation / Communications protocol / Secret sharing / Transmission Control Protocol / Information-theoretic security / IP / Computational complexity theory / Zero-knowledge proof / PP / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-07 04:07:04
124Broadcast encryption / Copy protection / Digital rights management / ID-based encryption / RSA / Secret sharing / Cipher / Cryptography / Public-key cryptography / Key management

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes Nuttapong Attrapadung, Kazukuni Kobara, and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of Tokyo 4-

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
125Boolean algebra / Applied mathematics / Theoretical computer science / PROPT / Secure multi-party computation / Numerical software / Mathematics

Parallel Multi-Party Computation from Linear Multi-Secret Sharing Schemes ? Zhifang Zhang1 , Mulan Liu1?? , and Liangliang Xiao2 1 Academy of Mathematics and Systems Science, Key Laboratory of Mathematics

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
126Information / Internet protocols / Password-authenticated key agreement / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ? Jan Camenisch1 , Robert R. Enderlein1,2 , and Gregory Neven1 {jca,enr,nev}@zurich.ibm.com 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-05 05:22:56
127Bloom filter / Hashing / Data / Signal processing filter / Database index / Filter / Hash function / Electronic filter / Secret sharing / Electronics / Electronic engineering / Filter theory

An Alternative to Fixed-Key Based Pre-Indexing Joel C. Frank • Shayna M. Frank • Thomas M. Kroeger
 Ethan L. Miller • Darrell D. E. Long Center for Research in Storage Systems"

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2014-09-25 12:21:50
128Labour law / Non-disclosure agreement / Information / Trade secret / Security / Proprietary software / Document / Intellectual property law / Law / Information sensitivity

NDA FAQs What is an NDA? A non-disclosure agreement (NDA) (also known as confidentiality agreement, CA, confidential disclosure agreement, CDA), is a legally-binding contract which governs the sharing of information be

Add to Reading List

Source URL: www.hhsresearchadmin.ca

Language: English - Date: 2014-07-17 08:33:55
129Fibers / Twine / Nature / Species / Ecosystem / Food web / Ecology / Biology / Ropework / Fasteners

WHO AM I? The web of life … with a twist! Source: Various, including - Cornell, Joseph[removed]Sharing Nature with Children. Nevada City, CA: Dawn Publications. Basic Description: Each player is assigned a secret spec

Add to Reading List

Source URL: www.bgci.org

Language: English - Date: 2008-11-06 10:53:46
130Public-key cryptography / Information-theoretic security / Verifiable secret sharing / Computer security / Cloud computing / Password / Secret sharing / Quantum cryptography / Trustworthy computing / Cryptography / Cryptographic protocols / Secure multi-party computation

The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-09 06:11:33
UPDATE