DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Secret sharing
Secret sharing
Secret Sharing and Shared Digital Signature Using Elliptic Curves
CHURP: Dynamic-Committee Proactive Secret Sharing
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms
Practical Threshold Signatures with Linear Secret Sharing Schemes*
Cryptography Knowledge Area (Draft for Comment)
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
A New Approach to the Secret Image Sharing with Steganography and Authentication
Function Secret Sharing⋆
Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two
Threshold Changeable Secret Sharing Schemes Revisited✩
Revisiting Shared Data Protection Against Key Exposure
A Novel Approach for Verifiable Secret Sharing by Using a One Way Hash Function
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures
COT 6427: Secret Sharing Protocols
A Secret Sharing Scheme Based on AES
0.1 Shamir's Secret Sharing
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements
Cryptographic Algorithms for Privacy-Preserving Online Applications
Top View
Q1. Explain Secret and Public Key Cryptography Schemes. Use Small Examples to Illustrate Your Claims
On-Line Secret Sharing
Probabilistic Secret Sharing
Cheating Human Vision in Visual Secret Sharing
Public Verifiability from Pairings in Secret Sharing Schemes
Secret-Sharing Schemes: a Survey
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
Visual Secret Sharing: a Review
An Efficient Lattice-Based Secret Sharing Construction
Lecture Notes in Secret Sharing
SETUP in Secret Sharing Schemes Using Random Values
MPSS: Mobile Proactive Secret Sharing
Multi-Party Covert Communication with Steganography and Quantum Secret Sharing
Strong (N,T,N) Verifiable Secret Sharing Scheme
9 Secret Sharing and Visual Cryptography Schemes A
Brief Announcement: Proactive Secret Sharing with a Dishonest Majority
Secret Sharing in Visual Cryptography
Secret Sharing Vs. Encryption-Based Techniques for Privacy Preserving Data Mining 1
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements
Distributed Multi-User Secret Sharing
Proof of File Access in a Private P2P Network Using Blockchain
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Publicly Verifiable Secret Sharing and Its Use in Threshold Cryptography
K-N Secret Sharing Scheme Encrypting Multiple Images in Visual Cryptography
Proactive Secret Sharing in Dynamic Environments
Security & Cryptography
Analyzing Proactive Secret Sharing Schemes
Simple Secret Sharing and Threshold RSA Signature Schemes
3 Secret Sharing
A Digital Signature with Threshold Generation and Verification
Secret-Sharing for NP
Efficient Proactive Secret Sharing
Secret Sharing, Random Numbers, and Information Hiding
(N, N/8) Multi Secret Image Sharing Scheme with Security Key
Verifiable Additive Homomorphic Secret Sharing
Applying Hash Functions in the Latin Square Based Secret Sharing Schemes
Protecting AES with Shamir's Secret Sharing Scheme⋆
A Novel Threshold Changeable Secret Image Sharing Scheme
Publicly Verifiable Secret Sharing
APSS: Proactive Secret Sharing in Asynchronous Systems
Simple and Efficient Secret Sharing Schemes for Sharing Data and Image
A Practical Scheme for Non-Interactive Verifiable Secret Sharing
SSS in Cloud
Lecture 9: Secret Sharing, Threshold Cryptography, MPC
Secret Sharing and Visual Cryptography Outline