Results 11 to 20 of about 120 (52)

Towards efficient private distributed computation on unbounded input streams

open access: yesJournal of Mathematical Cryptology, 2015
In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the ...
Dolev Shlomi   +4 more
doaj   +1 more source

Persistent asymmetric password-based key exchange

open access: yesJournal of Mathematical Cryptology, 2014
Asymmetric password based key exchange is a key exchange protocol where a client and a server share a low entropic password while the server additionally owns a high entropic secret with respect to a public key. There are simple solutions for this, e.g.,
Jiang Shaoquan
doaj   +1 more source

Optimal Information Rate of Secret Sharing Schemes on Trees [PDF]

open access: yes, 2013
The information rate for an access structure is the reciprocal of the load of the optimal secret sharing scheme for this structure. We determine this value for all trees: it is (2 - 1/c)(-1), where is the size of the largest core of the tree. A subset of
Csirmaz, László, Tardos, Gábor
core   +2 more sources

Context-Aware Access Control Model for Privacy Support in Mobile-Based Assisted Living

open access: yesJournal of Intelligent Systems, 2015
The average lifetime of people in advanced countries is significantly increased in the XXI century. The number of old and dependent people is rising due many innovations in health care: new technologies, medicine, and a lot of innovative devices that ...
Smirnov Alexander   +3 more
doaj   +1 more source

Near-complete external difference families [PDF]

open access: yes, 2016
We introduce and explore near-complete external difference families, a partitioning of the nonidentity elements of a group so that each nonidentity element is expressible as a difference of elements from distinct subsets a fixed number of times.
Davis, James A.   +2 more
core   +1 more source

A survey and refinement of repairable threshold schemes

open access: yesJournal of Mathematical Cryptology, 2018
We consider repairable threshold schemes (RTSs), which are threshold schemes that enable a player to securely reconstruct a lost share with help from their peers.
Laing Thalia M., Stinson Douglas R.
doaj   +1 more source

Disjoint difference families and their applications [PDF]

open access: yes, 2015
Difference sets and their generalisations to difference families arise from the study of designs and many other applications. Here we give a brief survey of some of these applications, noting in particular the diverse definitions of difference families ...
Ng, S.-L., Paterson, Maura B.
core   +5 more sources

A characterisation of ideal weighted secret sharing schemes

open access: yesJournal of Mathematical Cryptology, 2015
Beimel, Tassa and Weinreb [SIAM J. Discrete Math. 22 (2008), 360–397] and Farràs and Padró [Lecture Notes in Comput. Sci. 5978, Springer, 2010, 219–236] partially characterised access structures of ideal weighted secret sharing schemes in terms of the ...
Hameed Ali, Slinko Arkadii
doaj   +1 more source

Secret Sharing and Shared Information

open access: yes, 2017
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret.
Rauh, Johannes
core   +2 more sources

Scientometric dimensions of cryptographic research [PDF]

open access: yes, 2015
Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard the digital information assets as well as to defend the invasion of privacy in modern information society ...
Pal, Jiban K.
core   +1 more source

Home - About - Disclaimer - Privacy