Secret sharing

Results: 195



#Item
41Timed-Release Secret Sharing Schemes with Information Theoretic Security Yohei Watanabe and Junji Shikata Yokohama National University, Japan BalkanCryptSec 2014

Timed-Release Secret Sharing Schemes with Information Theoretic Security Yohei Watanabe and Junji Shikata Yokohama National University, Japan BalkanCryptSec 2014

Add to Reading List

Source URL: www.gstl.itu.edu.tr

Language: English - Date: 2014-10-18 19:43:37
    42Ecient Rational Secret Sharing in Standard Communication Networks Georg Fuchsbauer  Jonathan Katz

    Ecient Rational Secret Sharing in Standard Communication Networks Georg Fuchsbauer Jonathan Katz

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2010-02-12 06:08:15
      43LNCSRobuster Combiners for Oblivious Transfer

      LNCSRobuster Combiners for Oblivious Transfer

      Add to Reading List

      Source URL: dcg.ethz.ch

      Language: English - Date: 2014-09-26 08:36:33
      44Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

      Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-06-28 21:51:08
      45Nearly Optimal Robust Secret Sharing Mahdi Cheraghchi∗ Department of Computing Imperial College London London, UK

      Nearly Optimal Robust Secret Sharing Mahdi Cheraghchi∗ Department of Computing Imperial College London London, UK

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-10-05 14:18:19
        46Unconditionally-Secure Robust Secret Sharing with Minimum Share Size Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini Department of Computer Science University of Calgary, Canada

        Unconditionally-Secure Robust Secret Sharing with Minimum Share Size Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini Department of Computer Science University of Calgary, Canada

        Add to Reading List

        Source URL: fc13.ifca.ai

        Language: English - Date: 2013-03-27 20:41:00
          47I Secret Sharing I Robust Secret Sharing I Proposed Scheme I Comparing with Existing Constructions I Concluding Remark  Unconditionally-Secure Robust Secret Sharing with Minimum Share Size Rei Safavi-Naini and Mahabir P.

          I Secret Sharing I Robust Secret Sharing I Proposed Scheme I Comparing with Existing Constructions I Concluding Remark Unconditionally-Secure Robust Secret Sharing with Minimum Share Size Rei Safavi-Naini and Mahabir P.

          Add to Reading List

          Source URL: fc13.ifca.ai

          Language: English - Date: 2013-04-04 03:04:00
            48Separating Sources for Encryption and Secret Sharing Yevgeniy Dodis NYU  Krzysztof Pietrzak

            Separating Sources for Encryption and Secret Sharing Yevgeniy Dodis NYU Krzysztof Pietrzak

            Add to Reading List

            Source URL: research.ihost.com

            Language: English - Date: 2006-03-28 15:48:52
              49PKC 2015 – March 31st  Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven

              PKC 2015 – March 31st Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven

              Add to Reading List

              Source URL: www.e7n.ch

              Language: English
              50Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen1,2 and Sander Siim1,2 1

              Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen1,2 and Sander Siim1,2 1

              Add to Reading List

              Source URL: www.dcsec.uni-hannover.de

              Language: English - Date: 2015-05-21 08:55:30