Filters








1,166 Hits in 3.1 sec

Efficient proactive secret sharing

Jacqueline Brendel, Denise Demirel
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zb4rq5sfzzczvgii5ae2373dhq" style="color: black;">2016 14th Annual Conference on Privacy, Security and Trust (PST)</a> </i> &nbsp;
In addition to improving practicability the presented proactive secret sharing solution, called EPSS, performs data aggregation to provide an efficient solution with respect to the communication complexity  ...  The only known approach to achieve this, as required, for instance, for medical records, is to use proactive secret sharing. However, all currently known schemes suffer from being inefficient.  ...  CONCLUSIONS In this work we presented a novel proactive secret sharing scheme EPSS which improves the state of the art with respect to practicability and efficiency.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/pst.2016.7907013">doi:10.1109/pst.2016.7907013</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/pst/BrendelD16.html">dblp:conf/pst/BrendelD16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cxdperscaveltkb5f6t7jaxlym">fatcat:cxdperscaveltkb5f6t7jaxlym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307020641/https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publikationen/Crossing/BD16.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6f/0d/6f0d59472810259001897585a78f86455bb67910.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/pst.2016.7907013"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices

Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
<span title="">2021</span> <i title="IEEE"> 2021 IEEE Symposium on Security and Privacy (SP) </i> &nbsp;
In particular we give a highly efficient tρ = 2 protocol to upgrade a number of standard (2, n) threshold signature schemes to proactive security with offline refresh.  ...  Proactive security is the notion of defending a distributed system against an attacker who compromises different devices through its lifetime, but no more than a threshold number of them at any given time  ...  [DKLs19] with our refresh procedure, and providing us with the benchmarks for that protocol reported in this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp40001.2021.00067">doi:10.1109/sp40001.2021.00067</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hl6cetwt2bfpnbacawkuc6p2ri">fatcat:hl6cetwt2bfpnbacawkuc6p2ri</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220102140414/https://eprint.iacr.org/2019/1328.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3c/be/3cbe4495f2590f7fde0f9f6e8607094b70388a19.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sp40001.2021.00067"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Efficient Dynamic-Resharing "Verifiable Secret Sharing" against mobile adversary [chapter]

Noga Alon, Zvi Galil, Moti Yung
<span title="">1995</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We present a novel efficient variant of Verifiable Secret Sharing (VSS) where the dealing of shares is dynamically refreshed (without changing or corrupting the secret) against the threat of the recently  ...  VSS enables a dealer to distribute its secret to a set of trustees, so that they are assured that the sharing is valid and that they can open it later, and further no small group of trustees can open it  ...  Proactive VSS from Dynamic-Resharing Next we will discuss how we can use the dynamic-resharing to have a proactive secret sharing (a secret maintained by the community).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-60313-1_168">doi:10.1007/3-540-60313-1_168</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6jny5mkx45g6vjfcjxnfucab5u">fatcat:6jny5mkx45g6vjfcjxnfucab5u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20050528140736/http://www.cs.tau.ac.il:80/~nogaa/PDFS/yung.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/79/d879e2072ffffe1989fab7af66f164f711c943c9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-60313-1_168"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

How to Share Secret Efficiently over Networks

Lein Harn, Ching-Fang Hsu, Zhe Xia, Junwei Zhou
<span title="">2017</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
In a secret-sharing scheme, the secret is shared among a set of shareholders, and it can be reconstructed if a quorum of these shareholders work together by releasing their secret shares.  ...  To solve this problem, we introduce a new type of secret-sharing, called protected secret-sharing (PSS), in which the shares possessed by shareholders not only can be used to reconstruct the original secret  ...  In a ( , ) threshold secret-sharing scheme, the secret is divided into shares so that it can only be recovered with or more than shares, but fewer than shares cannot reveal any information of the secret  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2017/5437403">doi:10.1155/2017/5437403</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n5br5k4epjbxnadrs2e5usg3oa">fatcat:n5br5k4epjbxnadrs2e5usg3oa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190309030521/http://pdfs.semanticscholar.org/fd77/85774b5a3e47c943d78ccc29ca4a5f3e0f6c.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fd/77/fd7785774b5a3e47c943d78ccc29ca4a5f3e0f6c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2017/5437403"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure [chapter]

Yuanbo Guo, Jianfeng Ma, Yadi Wang
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We use a cryptographic (f, n) secret sharing scheme to distribute parts of the clients' proxy certificates and use a secure multi-party computation scheme to perform the signatures such that the proxy  ...  A correctly and continually working authorization and authentication service is essential for the grid computing system, so it is very necessary to maintain efficient this service with high availability  ...  So along with the secret shares, he also generates a verification share to go along with each key share, and broadcast the verification shares to all clients.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11428862_32">doi:10.1007/11428862_32</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xqi5ebsntfakvmdltri6kj6xlm">fatcat:xqi5ebsntfakvmdltri6kj6xlm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180727161758/https://link.springer.com/content/pdf/10.1007%2F11428862_32.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ca/cd/cacdc5e7ee46b28813dfee7e251b3b171fab034e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11428862_32"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Unconditionally secure social secret sharing scheme

M. Nojoumian, D.R. Stinson, M. Grainger
<span title="">2010</span> <i title="Institution of Engineering and Technology (IET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/j62f2h4klvgypfdtaqw2k35uie" style="color: black;">IET Information Security</a> </i> &nbsp;
We introduce the notion of a Social Secret Sharing Scheme, in which shares are allocated based on a player's reputation and the way he interacts with other participants.  ...  with other players for the share renewal or secret recovery).  ...  Contribution Our major contribution is the idea of a social secret sharing scheme, where shares are allocated based on each player's reputation and behaviors.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-ifs.2009.0098">doi:10.1049/iet-ifs.2009.0098</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/msri3f2ra5authfu67po7dsfyu">fatcat:msri3f2ra5authfu67po7dsfyu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829225647/http://faculty.eng.fau.edu/nojoumian/Files/SSS.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c1/85/c185dd9137efa4a0ed0f6d47c3dd74552b33ca39.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-ifs.2009.0098"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

ADVANCED SECURITY FOR MANETS USING THRESHOLD CRYPTOGRAPHY

H. Ateeq Ahmed .
<span title="2015-04-25">2015</span> <i title="eSAT Publishing House"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m4rdj3kwwfcbvfzkv6kcnagwtm" style="color: black;">International Journal of Research in Engineering and Technology</a> </i> &nbsp;
The development of technologies such as Mobile and Adhoc networks have made the distributed environments widely accepted as they allows large scale support for resource sharing infrastructure.  ...  As mentioned earlier, one the major challenge that needs to be addressed is security of authentication. We conclude some issues and determine some challenges that can take place in future.  ...  This paper presents a significantly improved construction and a complete rewrite and evaluation of our implementation that can significantly improves the overall concept of security for MANETs by using  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2015.0414011">doi:10.15623/ijret.2015.0414011</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6uin7y72hfbpbei4bwpovamtjq">fatcat:6uin7y72hfbpbei4bwpovamtjq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200213075513/https://ijret.org/volumes/2015v04/i14/IJRET20150414011.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/71/ed/71ed98b85b21abde5c658bdfbb70faa935ce4b1f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2015.0414011"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Long term confidentiality: a survey

Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alex Wiesmaier
<span title="2012-09-16">2012</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c45m6ttnaje4xbjsq7m2c6df2a" style="color: black;">Designs, Codes and Cryptography</a> </i> &nbsp;
Yet encryption under a computationally secure cryptosystem cannot provide a guarantee of long term confidentiality, due to potential advances in computing power or cryptanalysis.  ...  In summary, in proactive verifiable secret sharing schemes, the lifetime of a system is divided into fixed time periods, each ending with an update phase.  ...  To provide security against destruction, these schemes are combined with share verification schemes obtaining verifiable proactive secret sharing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-012-9747-6">doi:10.1007/s10623-012-9747-6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uk3afgjhrfduxeytawbqkvt4fq">fatcat:uk3afgjhrfduxeytawbqkvt4fq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20121114225311/http://eprint.iacr.org/2012/449.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b6/f6/b6f6440105886107d82dcc486767f231972971ce.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-012-9747-6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

ENHANCHING SECURITY FOR MANETs USING DISCRETE KEY GENERATIONS

ATEEQ AHMED H, SAMSON PAUL K, HARISH KUMAR REDDY B
<span title="2020-09-28">2020</span> <i title="International Journal of Engineering Technology and Management Sciences"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zivrhsqxqjdbxi3hkegoc2yegu" style="color: black;">International Journal of Engineering Technology and Management Sciences</a> </i> &nbsp;
Instead, devices discover others within range to form a network for those computers. These networks often suffer with a problem of Malicious attacks from different types of attackers.  ...  Mobile Ad Hoc is a network connection method which is most often associated with wireless devices. The connection is established for the duration of one session and requires no base station.  ...  Solution to proactive multi-secret Sharing Threshold Schemes For threshold multisecret sharing two schemes are in use CA-based and ID-based as proposed by.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46647/ijetms.2020.v04i05.008">doi:10.46647/ijetms.2020.v04i05.008</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4vdvqs6hfzhttl6ms3zlirs3q4">fatcat:4vdvqs6hfzhttl6ms3zlirs3q4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200930113756/http://ijetms.in/Vol-4-issue-5/IJETMS-SE-012.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/f1/f4f1d052336487fc76c0ebd3c6816bc2530279a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46647/ijetms.2020.v04i05.008"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Crypto-integrity [chapter]

Moti Yung
<span title="">2002</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The paper is written as a position paper and not as a survey of the vast relevant literature.  ...  Designing cryptographic mechanisms and products is a challenging task.  ...  For example a "distributed proof" can be conducted assuring a group of users with honest majority of a fact while not revealing the underlying secret.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-36178-2_35">doi:10.1007/3-540-36178-2_35</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/w4ydprherzawlc3zynft2sr7ve">fatcat:w4ydprherzawlc3zynft2sr7ve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830134208/https://link.springer.com/content/pdf/10.1007%2F3-540-36178-2_35.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fc/b7/fcb719f830da4b048c9a172bc82b840c76f34e39.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-36178-2_35"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Steganography and authentication in image sharing without parity bits

Ching-Nung Yang, Jin-Fwu Ouyang, Lein Harn
<span title="">2012</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7htih4lbifdrfgkjfts6iewfoa" style="color: black;">Optics Communications</a> </i> &nbsp;
Recently, a polynomial-based (k, n) steganography and authenticated image sharing (SAIS) scheme was proposed to share a secret image into n stego-images.  ...  At the same time, one can reconstruct a secret image with any k or more than k stego-images, but one cannot obtain any information about the secret from fewer than k stego-images.  ...  A (k −1)degree bivariate polynomial has the form f x; y ð Þ¼∑ 0≤i;j≤ k−1 ð Þ a ij x i y j , on which some (k, n) verifiable secret sharing schemes and proactive secret sharing schemes were proposed [8  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.optcom.2011.12.003">doi:10.1016/j.optcom.2011.12.003</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ai6pf2dkavcxva452imqr6xafa">fatcat:ai6pf2dkavcxva452imqr6xafa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180920165333/http://h.web.umkc.edu:80/harnl/papers/2012%20j2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9a/f7/9af785026d65ce653eb13822e934e6b3458aca1c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.optcom.2011.12.003"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Founding Digital Currency on Secure Computation

Karim El Defrawy, Joshua Lampkins
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS &#39;14</a> </i> &nbsp;
We accomplish this by reducing the distributed (secret-shared) storage footprint and the required bandwidth and computation for proactively refreshing the ledger to ensure long-term confidentiality and  ...  a long time in the future.  ...  Protocols for proactively refreshing shared secrets proceed in two phases.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660293">doi:10.1145/2660267.2660293</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/DefrawyL14.html">dblp:conf/ccs/DefrawyL14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kb7zvibczbhfloeti3vxigneim">fatcat:kb7zvibczbhfloeti3vxigneim</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218115708/https://static.aminer.org/pdf/20170130/pdfs/ccs/sv6ooeydauzr8n9j0jvilgqkftxc1gsl.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1d/90/1d90f75bedec232d5aa95640ae8a1168eb497c69.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660293"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Secure Key Management in the Cloud [chapter]

Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs  ...  We consider fully autonomous servers that switch between online and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance  ...  However, for the same reason as for Fact 1, secret sharing considered in isolation can never give both availability and confidentiality in case of a dishonest majority of parties.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-45239-0_16">doi:10.1007/978-3-642-45239-0_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t6mrxabmlvdf7dolyorq5ct5q4">fatcat:t6mrxabmlvdf7dolyorq5ct5q4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160908195226/http://eprint.iacr.org/2013/629.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/88/9c/889c50e6f4d397ba968c709a1f3e37bdee514382.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-45239-0_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Distributed Key Generation for the Internet

Aniket Kate, Ian Goldberg
<span title="">2009</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s77bfh66ena2znlnuhuruo464a" style="color: black;">2009 29th IEEE International Conference on Distributed Computing Systems</a> </i> &nbsp;
We propose a practical system model and define an efficient verifiable secret sharing scheme in it.  ...  Using our verifiable secret sharing scheme and a leader-based agreement protocol, we then design a DKG protocol for publickey cryptography.  ...  Acknowledgements This work is supported by NSERC, MITACS, and a David R. Cheriton Graduate Scholarship.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icdcs.2009.21">doi:10.1109/icdcs.2009.21</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icdcs/KateG09.html">dblp:conf/icdcs/KateG09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l7awez5lprgcnivbcrkrjspt7u">fatcat:l7awez5lprgcnivbcrkrjspt7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170825061000/http://www.cypherpunks.ca/~iang/pubs/DKG.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/33/88/33888a32f1e2c90abdf6f802564c666cf50f5390.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icdcs.2009.21"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Mobile proactive secret sharing

David A. Schultz, Barbara Liskov, Moses Liskov
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t5fzg7fyy5byfdcl2vrzbn43ty" style="color: black;">Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing - PODC &#39;08</a> </i> &nbsp;
This thesis describes mobile proactive secret sharing (MPSS), an extension of proactive secret sharing.  ...  Mobile proactive secret sharing is much more flexible than proactive secret sharing in terms of group membership: instead of the group of shareholders being exactly the same from one epoch to the next,  ...  Motivating Proactive Secret Sharing This section describes a typical scenario in which proactive secret sharing plays a key role, and clarifies why secret sharing is important.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1400751.1400856">doi:10.1145/1400751.1400856</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/podc/SchultzLL08.html">dblp:conf/podc/SchultzLL08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/izzifji24fe3dpeh6pz7xqg5qu">fatcat:izzifji24fe3dpeh6pz7xqg5qu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100616172041/http://pmg.csail.mit.edu/papers/mpss-thesis.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/15/4b/154b6028e572110692209afc06d184f8aaae9176.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1400751.1400856"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,166 results