The Secret Adversary

Results: 3



#Item
1Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
2The Secret Adversary / Over / Next Magazine / Partners in Crime / Literature / Tommy and Tuppence / Singles

THE SECRET ADVERSARY AGATHA CHRISTIE∗ TO ALL THOSE WHO LEAD MONOTONOUS LIVES IN THE HOPE THAT THEY MAY EXPERIENCE AT SECOND HAND

Add to Reading List

Source URL: www.pdfbooks.co.za

Language: English - Date: 2015-02-21 14:54:29
3Commitment scheme / Proactive secret sharing / Ciphertext indistinguishability / Adversary model / Advantage / Cryptography / Cryptographic protocols / Secret sharing

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-20 03:48:31
UPDATE