DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Secret sharing

Secret sharing

  • Secret Sharing and Shared Digital Signature Using Elliptic Curves

    Secret Sharing and Shared Digital Signature Using Elliptic Curves

  • CHURP: Dynamic-Committee Proactive Secret Sharing

    CHURP: Dynamic-Committee Proactive Secret Sharing

  • Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms

    Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms

  • Practical Threshold Signatures with Linear Secret Sharing Schemes*

    Practical Threshold Signatures with Linear Secret Sharing Schemes*

  • Cryptography Knowledge Area (Draft for Comment)

    Cryptography Knowledge Area (Draft for Comment)

  • Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems

    Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems

  • A New Approach to the Secret Image Sharing with Steganography and Authentication

    A New Approach to the Secret Image Sharing with Steganography and Authentication

  • Function Secret Sharing⋆

    Function Secret Sharing⋆

  • Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two

    Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two

  • Threshold Changeable Secret Sharing Schemes Revisited✩

    Threshold Changeable Secret Sharing Schemes Revisited✩

  • Revisiting Shared Data Protection Against Key Exposure

    Revisiting Shared Data Protection Against Key Exposure

  • A Novel Approach for Verifiable Secret Sharing by Using a One Way Hash Function

    A Novel Approach for Verifiable Secret Sharing by Using a One Way Hash Function

  • Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures

    Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures

  • COT 6427: Secret Sharing Protocols

    COT 6427: Secret Sharing Protocols

  • A Secret Sharing Scheme Based on AES

    A Secret Sharing Scheme Based on AES

  • 0.1 Shamir's Secret Sharing

    0.1 Shamir's Secret Sharing

  • Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements

    Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements

  • Cryptographic Algorithms for Privacy-Preserving Online Applications

    Cryptographic Algorithms for Privacy-Preserving Online Applications

Top View
  • Q1. Explain Secret and Public Key Cryptography Schemes. Use Small Examples to Illustrate Your Claims
  • On-Line Secret Sharing
  • Probabilistic Secret Sharing
  • Cheating Human Vision in Visual Secret Sharing
  • Public Verifiability from Pairings in Secret Sharing Schemes
  • Secret-Sharing Schemes: a Survey
  • Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
  • Visual Secret Sharing: a Review
  • An Efficient Lattice-Based Secret Sharing Construction
  • Lecture Notes in Secret Sharing
  • SETUP in Secret Sharing Schemes Using Random Values
  • MPSS: Mobile Proactive Secret Sharing
  • Multi-Party Covert Communication with Steganography and Quantum Secret Sharing
  • Strong (N,T,N) Verifiable Secret Sharing Scheme
  • 9 Secret Sharing and Visual Cryptography Schemes A
  • Brief Announcement: Proactive Secret Sharing with a Dishonest Majority
  • Secret Sharing in Visual Cryptography
  • Secret Sharing Vs. Encryption-Based Techniques for Privacy Preserving Data Mining 1


© 2024 Docslib.org    Feedback