Secret sharing

Results: 195



#Item
11

Scalable Rational Secret Sharing Introduction Scalable Rational Secret Sharing Dani et al. University of New Mexico

Add to Reading List

Source URL: www.dcg.ethz.ch

- Date: 2014-09-26 08:28:56
    12

    SECRET ELEPHANTS FOREST EXPERIENCE WITH GARETH PATTERSON Price from: R5,495 | $395 | €365 Based on 2 guests sharing for 2 nights THE SECRET ELEPHANTS FOREST EXPERIENCE

    Add to Reading List

    Source URL: capturedinafrica.com

    - Date: 2015-12-03 07:49:15
      13Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

      Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

      Add to Reading List

      Source URL: work.debayangupta.com

      Language: English - Date: 2014-06-25 08:00:47
      14Cryptocurrencies / Cryptography / Computing / E-commerce / Blockchain / Ethereum / Secure multi-party computation / Secret sharing / Smart contract / Bitcoin / Distributed hash table / Shadow

      Enigma: Decentralized Computation Platform with Guaranteed Privacy Guy Zyskind Oz Nathan

      Add to Reading List

      Source URL: web.media.mit.edu

      Language: English - Date: 2015-06-27 14:46:30
      15Cryptography / Secure multi-party computation / Secure two-party computation / Ciphertext indistinguishability / Consensus / Secret sharing / IP / Control theory

      MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

      Add to Reading List

      Source URL: www.cs.rpi.edu

      Language: English - Date: 2011-02-19 14:29:40
      16Mathematics / Algebra / Polynomials / Secret sharing / IP / Finite fields / Computer algebra / Proactive secret sharing

      ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

      Add to Reading List

      Source URL: www.crypto.ethz.ch

      Language: English - Date: 2015-04-27 04:43:17
      17Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

      Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2016-01-26 19:57:17
      18Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

      The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2007-08-20 03:37:31
      19Secret sharing / Cryptography / Scheme

      A1_11042_Cover page 1.indd

      Add to Reading List

      Source URL: debut.cis.nctu.edu.tw

      Language: English - Date: 2015-09-05 23:29:49
      20Cryptography / Dining cryptographers problem / Secure multi-party computation / Secret sharing / Verifiable secret sharing / Public-key cryptography / Cryptographic protocol / Blob / David Chaum

      page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

      Add to Reading List

      Source URL: www.chaum.com

      Language: English - Date: 2015-05-26 20:05:16
      UPDATE