Results 11 to 20 of about 120 (52)
Towards efficient private distributed computation on unbounded input streams
In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the ...
Dolev Shlomi +4 more
doaj +1 more source
Persistent asymmetric password-based key exchange
Asymmetric password based key exchange is a key exchange protocol where a client and a server share a low entropic password while the server additionally owns a high entropic secret with respect to a public key. There are simple solutions for this, e.g.,
Jiang Shaoquan
doaj +1 more source
Optimal Information Rate of Secret Sharing Schemes on Trees [PDF]
The information rate for an access structure is the reciprocal of the load of the optimal secret sharing scheme for this structure. We determine this value for all trees: it is (2 - 1/c)(-1), where is the size of the largest core of the tree. A subset of
Csirmaz, László, Tardos, Gábor
core +2 more sources
Context-Aware Access Control Model for Privacy Support in Mobile-Based Assisted Living
The average lifetime of people in advanced countries is significantly increased in the XXI century. The number of old and dependent people is rising due many innovations in health care: new technologies, medicine, and a lot of innovative devices that ...
Smirnov Alexander +3 more
doaj +1 more source
Near-complete external difference families [PDF]
We introduce and explore near-complete external difference families, a partitioning of the nonidentity elements of a group so that each nonidentity element is expressible as a difference of elements from distinct subsets a fixed number of times.
Davis, James A. +2 more
core +1 more source
A survey and refinement of repairable threshold schemes
We consider repairable threshold schemes (RTSs), which are threshold schemes that enable a player to securely reconstruct a lost share with help from their peers.
Laing Thalia M., Stinson Douglas R.
doaj +1 more source
Disjoint difference families and their applications [PDF]
Difference sets and their generalisations to difference families arise from the study of designs and many other applications. Here we give a brief survey of some of these applications, noting in particular the diverse definitions of difference families ...
Ng, S.-L., Paterson, Maura B.
core +5 more sources
A characterisation of ideal weighted secret sharing schemes
Beimel, Tassa and Weinreb [SIAM J. Discrete Math. 22 (2008), 360–397] and Farràs and Padró [Lecture Notes in Comput. Sci. 5978, Springer, 2010, 219–236] partially characterised access structures of ideal weighted secret sharing schemes in terms of the ...
Hameed Ali, Slinko Arkadii
doaj +1 more source
Secret Sharing and Shared Information
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret.
Rauh, Johannes
core +2 more sources
Scientometric dimensions of cryptographic research [PDF]
Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard the digital information assets as well as to defend the invasion of privacy in modern information society ...
Pal, Jiban K.
core +1 more source

