Verifiable secret sharing

Results: 53



#Item
1page bidon...  MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:16
2ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-04-27 13:05:10
3Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-12-16 17:13:11
4Scalable Rational Secret Sharing [Extended Abstract] Varsha Dani Mahnush Movahedi

Scalable Rational Secret Sharing [Extended Abstract] Varsha Dani Mahnush Movahedi

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
5journal of economic theory 83, 69article no. ET982444 Secure Protocols or How Communication Generates Correlation Olivier Gossner*

journal of economic theory 83, 69article no. ET982444 Secure Protocols or How Communication Generates Correlation Olivier Gossner*

Add to Reading List

Source URL: ogossner.free.fr

Language: English - Date: 2005-10-17 11:53:01
6Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-09-07 07:03:05
7Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
8Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
9STUDIES ON VERIFIABLE SECRET SHARING, BYZANTINE AGREEMENT AND MULTIPARTY COMPUTATION A THESIS submitted by

STUDIES ON VERIFIABLE SECRET SHARING, BYZANTINE AGREEMENT AND MULTIPARTY COMPUTATION A THESIS submitted by

Add to Reading List

Source URL: www.cs.bris.ac.uk

- Date: 2010-05-28 16:00:18
    10Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

    Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

    Add to Reading List

    Source URL: web.sfc.wide.ad.jp

    Language: English - Date: 2006-01-24 03:14:56