Verifiable secret sharing

Results: 53



#Item
21Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks Philippe Golle PARC [removed]

Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks Philippe Golle PARC [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-05-24 20:30:54
22On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1  Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
23Further Simplifications in Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA

Further Simplifications in Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
24Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse  Fred B. Schneider t

Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse Fred B. Schneider t

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:37:04
25APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

APSS: Proactive Secret Sharing in Asynchronous Systems LIDONG ZHOU Microsoft Research Silicon Valley FRED B. SCHNEIDER and ROBBERT VAN RENESSE Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-16 17:01:48
26The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-09 06:11:33
27MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2012-01-17 23:19:33
28Efficient and Distributed Secret Sharing in General Networks arXiv:1207.0120v3 [cs.CR] 27 Nov[removed]Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran

Efficient and Distributed Secret Sharing in General Networks arXiv:1207.0120v3 [cs.CR] 27 Nov[removed]Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-12-01 04:28:53
29A A Security Definition for Multi Secret Sharing and a Scheme Based on LWE Massoud Hadian Dehkordi, Iran University of Science and Technology Reza Ghasemi, Iran University of Science and Technology

A A Security Definition for Multi Secret Sharing and a Scheme Based on LWE Massoud Hadian Dehkordi, Iran University of Science and Technology Reza Ghasemi, Iran University of Science and Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-19 08:46:05