Verifiable secret sharing

Results: 53



#Item
11Structuring Proactive Secret Sharing in Mobile Ad-hoc Networks ∗ Keio Hitoshi Asaeda∗ , Musfiq Rahman† , Yoshihiro Toyama∗ University, Graduate School of Media and Governance, 5322, Endo, Fujisawa-shi, Kanagawa,

Structuring Proactive Secret Sharing in Mobile Ad-hoc Networks ∗ Keio Hitoshi Asaeda∗ , Musfiq Rahman† , Yoshihiro Toyama∗ University, Graduate School of Media and Governance, 5322, Endo, Fujisawa-shi, Kanagawa,

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2006-01-19 05:59:36
12MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2012-01-17 23:19:33
13Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay  Jonathan Katz

Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-07-05 10:54:06
14CS276 Cryptography  Spring 2004 LectureLecturer: David Wagner

CS276 Cryptography Spring 2004 LectureLecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
15Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
16An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡  January 12, 2013

An Equational Approach to Secure Multi-party Computation∗ Daniele Micciancio† Stefano Tessaro‡ January 12, 2013

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-09-26 16:14:53
17Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian ∗ Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton, Florida, USA mnojoumia

Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian ∗ Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton, Florida, USA mnojoumia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 10:57:06
18Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks Jonathan Kirsch1 and Brian Coan2 Johns Hopkins University, Baltimore, MD.  Telcordia Technologies, Piscataway, NJ.

Intrusion-Tolerant Group Management for Mobile Ad-Hoc Networks Jonathan Kirsch1 and Brian Coan2 Johns Hopkins University, Baltimore, MD. Telcordia Technologies, Piscataway, NJ.

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
19An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li ∗

An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 06:38:57
20Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 19:43:29