Results 201 to 210 of about 11,914 (236)

Secret Sharing System and Secret Sharing Matrix

2009 International Conference on Computational Intelligence and Security, 2009
To make the secret sharing management more effective and safe, based on the (k, n) threshold secret sharing scheme, this article propose a new concept of generalized (k, n)-secret sharing matrix, and proposed a more safe (t, k, n) threshold secret sharing scheme by generalizing the (t, k, n) threshold secret sharing matrix.
Guangliang Liu   +3 more
openaire   +1 more source

Overcoming security limitations of Secret Share techniques: the Nested Secret Share

2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021
Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to split a secret into fragments and to share them among parties in such a way that a subset can recompose the original information. SS techniques assure a high redundancy degree, but the security level is fixed.
Galletta A.   +4 more
openaire   +1 more source

Experimental quantum secret sharing

Fortschritte der Physik, 2006
AbstractWe consider two simple and practical protocols for multiparty communication and show their experimental realization. These protocols deal with the task of secret sharing in which a secret message is split among several parties in a way that its reconstruction requires their mutual collaboration.
Schmid, C.   +6 more
openaire   +3 more sources

On secret sharing schemes

Information Processing Letters, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo   +2 more
openaire   +2 more sources

Homomorphic Secret Sharing

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Crypto 2016, Eurocrypt 2017). A (2-party) HSS scheme splits an input x into shares (x0,x1) such that (1) each share computationally hides x, and (2) there exists an efficient homomorphic evaluation algorithm $\Eval$ such that for any function (or "program ...
Boyle, Elette   +4 more
openaire   +2 more sources

Deceptive Secret Sharing

2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018
Confidentiality is a fundamental goal in many security contexts. Deception is another goal in which the intention is to mislead adversaries, for example by planting false information in a system. In this paper, we consider an approach that combines confidentiality and deception using secret sharing, which has traditionally been used strictly for ...
Lei Zhang, Douglas Blough
openaire   +1 more source

Home - About - Disclaimer - Privacy