In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
Literature databases, scientific journals and com munication between researchers on the electronic level are rapidly developing tools in mathematics having high impact on the daily...
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
In this paper, we introduce memory [en]code, a project that evolved through an art+science collaboration. memory [en]code is an interactive tabletop installation that visualizes d...
Holly Schmidt, Uta Hinrichs, Alan Dunning, M. Shee...