Verifiable secret sharing

Results: 53



#Item
41An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:04:09
42Cryptography and Mechanism Design M o n i Naor* Dept. of Computer Science and Applied Math

Cryptography and Mechanism Design M o n i Naor* Dept. of Computer Science and Applied Math

Add to Reading List

Source URL: www.tark.org

Language: English - Date: 2011-10-23 10:31:50
43Practical Threshold Signatures Victor Shoup IBM Zurich Research Lab, S¨

Practical Threshold Signatures Victor Shoup IBM Zurich Research Lab, S¨

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
44Formal sciences / Shafi Goldwasser / Women in technology / Verifiable secret sharing / Symposium on Foundations of Computer Science / International Colloquium on Automata /  Languages and Programming / Symposium on Theory of Computing / Gödel Prize / Manuel Blum / Cryptography / Theoretical computer science / Applied mathematics

Shafi Goldwasser RSA Professor of Computer Science, Massachusetts Institute of Technology Professor of Computer Science and Applied Mathematics, Weizmann Institute of Science Principal Fields of Interest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-02-28 21:15:47
45Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-16 05:06:00
46In Advances in Cryptology—EUROCRYPT’96, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1996. pp[removed]Multi-Authority Secret-Ballot Elections with

In Advances in Cryptology—EUROCRYPT’96, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1996. pp[removed]Multi-Authority Secret-Ballot Elections with

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:11
47Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing Chunming Tang1,2,∗ Dingyi Pei1,3

Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing Chunming Tang1,2,∗ Dingyi Pei1,3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-16 21:12:51
48Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasail˘a, Vlad Alexa, Sorin Iftene

Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasail˘a, Vlad Alexa, Sorin Iftene

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-01 13:36:48
49Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Rosario Gennaro1 , Craig Gentry1 , and Bryan Parno2

Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Rosario Gennaro1 , Craig Gentry1 , and Bryan Parno2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-09-13 21:49:30
50In Advances in Cryptology—CRYPTO ’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]A Simple Publicly Verifiable Secret Sharing

In Advances in Cryptology—CRYPTO ’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]A Simple Publicly Verifiable Secret Sharing

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:09