Secret sharing

Results: 195



#Item
81Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 07:10:50
82Algebraic structures / Algebraic number theory / Scheme theory / Secret sharing / Algebraic number field / Group / Finite field / Field / Abelian group / Abstract algebra / Algebra / Field theory

What is Black Box Secret Sharing? Using Algebraic Number Fields New Approach: Primitive Sets

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-31 11:28:38
83Access structure / Structure / Key management / Secret sharing / Hierarchy

Hierarchical simple games, Structure and Characterisations Ali Hameed and Arkadii Slinko Department of Mathematics The University of Auckland

Add to Reading List

Source URL: cmss.auckland.ac.nz

Language: English - Date: 2012-04-02 23:58:54
84Cryptography / Quantum complexity theory / PP / Secure multi-party computation / Secure two-party computation / Verifiable secret sharing / Function / Transmission Control Protocol / Cryptographic protocols / Mathematics / Applied mathematics

Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-07-05 10:54:06
85Secret sharing / Verifiable secret sharing / Proactive secret sharing / Cryptography / Cryptographic protocols / Commitment scheme

CS276 Cryptography Spring 2004 LectureLecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
86Cryptographic protocols / Secret sharing / Dropbox / Cloud computing / Computing / Software

PDF Document

Add to Reading List

Source URL: www.buildingtrustincloud.org

Language: English - Date: 2014-10-09 07:27:13
87Verifiable secret sharing / Gödel Prize / Interactive proof system / Claude Crépeau / Pseudorandom function family / Probabilistic encryption / Oblivious transfer / Zero-knowledge proof / Provable security / Cryptography / Cryptographic protocols / Silvio Micali

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
88Secure multi-party computation / Computing / Universal composability / Communications protocol / Verifiable secret sharing / Boolean algebra / Π-calculus / Consensus / Cryptographic protocols / Data / Information

An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡ January 12, 2013

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-09-26 16:14:53
89Secret sharing / Proactive secret sharing / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Key management

Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian ∗ Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton, Florida, USA mnojoumia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 10:57:06
90Structure / Nash equilibrium / Strategic dominance / Solution concept / Permutation / Game theory / Mathematics / Problem solving

General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction Yoshio Okamoto The University of Electro-Communications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 22:03:15
UPDATE