Secret sharing

Results: 195



#Item
21Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
22Cryptography / Interpolation / Polynomials / Mathematics / Secure multi-party computation / Secret sharing / Lagrange polynomial / Finite field / Verifiable secret sharing

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-04-27 13:05:10
23Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
24Cryptography / Secret sharing / Secure multi-party computation / Communications protocol / Teague / Verifiable secret sharing

Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-12-16 17:13:11
25Public-key cryptography / Cryptography / Secret sharing / Homeomorphisms / Homomorphic encryption / Cryptographic protocol / Digital signature / Communications protocol / Secure multi-party computation / Universal composability

LNCSPractical Private Information Aggregation in Large Networks

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:54:47
26Cryptography / Public-key cryptography / XTR / Secret sharing / Non-commutative cryptography / Undeniable signature

LNCSUntraceable Electronic Cash

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:06:10
27Data management / Payment systems / Private information retrieval / WHOIS / Digital wallet / Internet privacy / Database / Distributed database / Server / Recommender system / Secret sharing

Practical PIR for Electronic Commerce∗ Ryan Henry Femi Olumofin Ian Goldberg

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
28Cloud storage / Cryptography / Cloud computing / Cloud infrastructure / Data security / Peer-to-peer / Internet privacy / Public-key cryptography / Secret sharing / Computer security / Key management / Distributed file system for cloud

A Comprehensive Security Model for Networking Applications

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2012-09-05 17:42:27
29Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-24 16:43:48
30Cryptography / Secure multi-party computation / Secret sharing / Cryptographic protocol / Communications protocol

Systematizing Secure Computation for Research and Decision Support Jason Perry, Debayan Gupta, Joan Feigenbaum and Rebecca N. Wright Rutgers University, Yale University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2014-09-07 12:36:30
UPDATE