<--- Back to Details
First PageDocument Content
Trusted third party / Trusted Computing / Secure multi-party computation / Secret sharing / ACM SIGACT / Trusted timestamping / Verifiable secret sharing / Threshold cryptosystem / Secure two-party computation / Cryptography / Cryptographic protocols / Public-key cryptography
Date: 2013-05-16 05:06:00
Trusted third party
Trusted Computing
Secure multi-party computation
Secret sharing
ACM SIGACT
Trusted timestamping
Verifiable secret sharing
Threshold cryptosystem
Secure two-party computation
Cryptography
Cryptographic protocols
Public-key cryptography

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Download Document from Source Website

File Size: 2,48 MB

Share Document on Facebook

Similar Documents

page bidon...  MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

DocID: 1qkUg - View Document

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1qe5J - View Document

Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

DocID: 1pQYA - View Document

Scalable Rational Secret Sharing [Extended Abstract] Varsha Dani Mahnush Movahedi

Scalable Rational Secret Sharing [Extended Abstract] Varsha Dani Mahnush Movahedi

DocID: 1oDFz - View Document

journal of economic theory 83, 69article no. ET982444 Secure Protocols or How Communication Generates Correlation Olivier Gossner*

journal of economic theory 83, 69article no. ET982444 Secure Protocols or How Communication Generates Correlation Olivier Gossner*

DocID: 1ms7a - View Document