Proactive secret sharing

Results: 18



#Item
1

Brief Announcement: Proactive Secret Sharing with a Dishonest Majority Shlomi Dolev Karim ElDefrawy

Add to Reading List

Source URL: web.cs.ucla.edu

Language: English - Date: 2017-11-29 01:25:51
    2Mathematics / Algebra / Polynomials / Secret sharing / IP / Finite fields / Computer algebra / Proactive secret sharing

    ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    Language: English - Date: 2015-04-27 04:43:17
    3Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

    The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2007-08-20 03:37:31
    4Public-key cryptography / Secret sharing / Key distribution / Proactive secret sharing / RSA / Verifiable secret sharing / Cryptography / Key management / Cryptographic protocols

    Structuring Proactive Secret Sharing in Mobile Ad-hoc Networks ∗ Keio Hitoshi Asaeda∗ , Musfiq Rahman† , Yoshihiro Toyama∗ University, Graduate School of Media and Governance, 5322, Endo, Fujisawa-shi, Kanagawa,

    Add to Reading List

    Source URL: web.sfc.wide.ad.jp

    Language: English - Date: 2006-01-19 05:59:36
    5Secret sharing / Computing / Proactive secret sharing / GiFT / Data / Kademlia / Network coding / Cryptographic protocols / Verifiable secret sharing / Software

    MPSS: Mobile Proactive Secret Sharing DAVID SCHULTZ and BARBARA LISKOV Massachusetts Institute of Technology and MOSES LISKOV The MITRE Corporation

    Add to Reading List

    Source URL: www.pmg.lcs.mit.edu

    Language: English - Date: 2012-01-17 23:19:33
    6Secret sharing / Verifiable secret sharing / Proactive secret sharing / Cryptography / Cryptographic protocols / Commitment scheme

    CS276 Cryptography Spring 2004 LectureLecturer: David Wagner

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:43
    7Secret sharing / Proactive secret sharing / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Key management

    Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian ∗ Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University Boca Raton, Florida, USA mnojoumia

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-28 10:57:06
    8Commitment scheme / Proactive secret sharing / Ciphertext indistinguishability / Adversary model / Advantage / Cryptography / Cryptographic protocols / Secret sharing

    The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-08-20 03:48:31
    9Secret sharing / Proactive secret sharing / Threshold cryptosystem / Communications protocol / Information-theoretic security / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

    Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-01 19:43:29
    10Key management / Electronic commerce / RSA / Secret sharing / Digital signature / Verifiable secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / Cryptography / Public-key cryptography / Cryptographic protocols

    Further Simplifications in Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2008-09-15 00:54:53
    UPDATE