Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    • Verifiable Secret Sharing
Robust threshold digital signature schemes are group signature schemes aiming to depart from the classical one person signer schemes. The term 'robust' means that such schemes can tolerate errors attempted by malicious adversary and the... more
    • by 
    •   5  
      Digital SignatureHuman ScienceElliptic Curve CryptographyVerifiable Secret Sharing
    • by 
    •   5  
      Ad hoc networkPolynomial InterpolationSecret SharingComputer
    • by 
    •   5  
      Coding TheoryGraph ColoringSecret SharingVertex Coloring
    • by 
    •   9  
      EngineeringTechnologyComputer NetworksMobile Ad Hoc Network
    • by 
    •   5  
      Digital SignatureHuman ScienceElliptic Curve CryptographyVerifiable Secret Sharing
    • by 
    •   11  
      Applied MathematicsStatisticsElectronic VotingCryptography
A publicly verifiable secret sharing (PVSS) scheme is a ver- ifiable secret sharing scheme with the property that the validity of the shares distributed by the dealer can be verified by any party; hence veri- fication is not limited to... more
    • by 
    •   2  
      Electronic VotingVerifiable Secret Sharing
    • by  and +1
    •   2  
      Lower BoundVerifiable Secret Sharing
Widespread utilization of mobile ad hoc networks (MANETs), which communicate via broadcast wireless channels without any sort of infrastructure, raises security concerns. Introduction of identity-based cryptography (IBC) shed some light... more
    • by 
    •   4  
      Threshold CryptographyIdentity-Based CryptographySecurity of ManetVerifiable Secret Sharing
    • by 
    •   9  
      AlgorithmsPrivacyInformation theoretic securityCryptology
In this paper, we propose a novel (2,2)(2,2) verifiable secret sharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the revealing and verifying phase, for all binary,... more
    • by 
    •   16  
      Image ProcessingComputational ComplexityPattern RecognitionPrevention
    • by 
    •   8  
      Distributed ComputingComputer SecurityCryptographyComputer Communications
    • by 
    •   4  
      Secure ComputationSecret SharingBoolean SatisfiabilityVerifiable Secret Sharing
    • by 
    •   6  
      Information theoretic securitySecure Multiparty ComputationSecret SharingCommunication Complexity
    • by 
    •   5  
      EngineeringDistributed Data MiningZero-Knowledge ProofsComputer Scienc
Federated Leaning is an emerging approach to manage cooperation between a group of agents for the solution of Machine Learning tasks, with the goal of improving each agent’s performance without disclosing any data. In this paper we... more
    • by 
    •   6  
      Computer ScienceArchitectureAnomaly DetectionScarcity
    • by 
    •   11  
      Mobile Ad Hoc NetworksMobile Ad Hoc NetworkManetProtocol
The unique characteristics and constraints of MANET have made the traditional approach to security inadequate. With this view in mind decentralized group key management is taken into consideration. A novel structure of the node is... more
    • by 
    •   4  
      Mobile adhoc NetworkGroup key managementVerifiable Secret SharingDecentralized group key
    • by 
    •   2  
      Hash FunctionsVerifiable Secret Sharing
    • by 
    •   4  
      Data SecuritySecret SharingTheoretical FoundationVerifiable Secret Sharing
    • by 
    •   8  
      Computer ScienceTheoryCryptographyLower Bound
    • by 
    •   17  
      Computer ScienceWireless Sensor NetworksCryptographyBootstrapping
    • by 
    •   3  
      Secure Multiparty ComputationSecure Function EvaluationVerifiable Secret Sharing
    • by 
    •   2  
      CryptologyVerifiable Secret Sharing
    • by 
    •   5  
      Digital SignatureHuman ScienceElliptic Curve CryptographyVerifiable Secret Sharing
    • by 
    •   4  
      Secure ComputationSecret SharingBoolean SatisfiabilityVerifiable Secret Sharing
    • by 
    •   61  
      Computer ScienceGame TheoryDistributed AlgorithmsRouting
The round complexity of interactive protocols is one of their most important complexity measures. In this work we prove that existing lower bounds for the round complexity of VSS can be circumvented by introducing a negligible probability... more
    • by 
    •   9  
      AlgorithmsPrivacyInformation theoretic securityCryptology
    • by 
    •   5  
      Digital SignatureHuman ScienceElliptic Curve CryptographyVerifiable Secret Sharing