Verifiable secret sharing

Results: 53



#Item
41Key management / Proactive secret sharing / Secret sharing / RSA / Threshold cryptosystem / Verifiable secret sharing / Group signature / Digital signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Cryptographic protocols

An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:04:09
42Silvio Micali / Verifiable secret sharing / Secure multi-party computation / Zero-knowledge proof / Index of cryptography articles / Noisy-storage model / Cryptography / Cryptographic protocols / Oblivious transfer

Cryptography and Mechanism Design M o n i Naor* Dept. of Computer Science and Applied Math

Add to Reading List

Source URL: www.tark.org

Language: English - Date: 2011-10-23 10:31:50
43RSA / Digital signature / Verifiable secret sharing / XTR / Group signature / Index of cryptography articles / Cryptography / Public-key cryptography / Random oracle

Practical Threshold Signatures Victor Shoup IBM Zurich Research Lab, S¨

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
44Formal sciences / Shafi Goldwasser / Women in technology / Verifiable secret sharing / Symposium on Foundations of Computer Science / International Colloquium on Automata /  Languages and Programming / Symposium on Theory of Computing / Gödel Prize / Manuel Blum / Cryptography / Theoretical computer science / Applied mathematics

Shafi Goldwasser RSA Professor of Computer Science, Massachusetts Institute of Technology Professor of Computer Science and Applied Mathematics, Weizmann Institute of Science Principal Fields of Interest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-02-28 21:15:47
45Trusted third party / Trusted Computing / Secure multi-party computation / Secret sharing / ACM SIGACT / Trusted timestamping / Verifiable secret sharing / Threshold cryptosystem / Secure two-party computation / Cryptography / Cryptographic protocols / Public-key cryptography

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-16 05:06:00
46Commitment scheme / XTR / Homomorphic encryption / Electronic voting / Blind signature / Zero-knowledge proof / Homomorphic secret sharing / Cryptography / Verifiable secret sharing / Public-key cryptography

In Advances in Cryptology—EUROCRYPT’96, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1996. pp[removed]Multi-Authority Secret-Ballot Elections with

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:11
47Verifiable secret sharing / Commitment scheme / Zero-knowledge proof / Secret sharing / Diffie–Hellman key exchange / Proof of knowledge / Non-interactive zero-knowledge proof / NP / ElGamal encryption / Cryptography / Cryptographic protocols / Publicly Verifiable Secret Sharing

Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing Chunming Tang1,2,∗ Dingyi Pei1,3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-16 21:12:51
48Public-key cryptography / Secret sharing / Verifiable secret sharing / Chinese remainder theorem / RSA / Publicly Verifiable Secret Sharing / Q / XTR / Secret sharing using the Chinese remainder theorem / Cryptography / Modular arithmetic / Commutative algebra

Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasail˘a, Vlad Alexa, Sorin Iftene

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-01 13:36:48
49Verifiable computing / Security / Computing / Verifiable secret sharing / Cryptography / Distributed computing / Secure communication

Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Rosario Gennaro1 , Craig Gentry1 , and Bryan Parno2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-09-13 21:49:30
50Public-key cryptography / Publicly Verifiable Secret Sharing / Finite fields / Verifiable secret sharing / Secret sharing / ElGamal encryption / Diffie–Hellman key exchange / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / Cryptography / Cryptographic protocols / Computational hardness assumptions

In Advances in Cryptology—CRYPTO ’99, Vol[removed]of Lecture Notes in Computer Science, Springer-Verlag, 1999. pp[removed]A Simple Publicly Verifiable Secret Sharing

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2001-04-03 10:12:09
UPDATE