Sciweavers

391 search results - page 6 / 79
» On-Line Secret Sharing
Sort
View
ASIACRYPT
1992
Springer
13 years 11 months ago
Nonperfect Secret Sharing Schemes
: Nonperfect secret sharing schemes NSSs have an advantage such that the size of shares can be shorter than that of perfect secret sharing schemes. This paper shows some basic prop...
Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
EUROPKI
2007
Springer
14 years 1 months ago
On Partial Anonymity in Secret Sharing
Abstract. Anonymous secret sharing schemes allow a secret to be recovered from shares regardless of the identity of shareholders. Besides being interesting in its own right, this p...
Vanesa Daza, Josep Domingo-Ferrer
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 7 months ago
Towards Conceptual Multidimensional Design in Decision Support Systems
Multidimensional databases support efficiently on-line analytical processing (OLAP). In this paper, we depict a model dedicated to multidimensional databases. The approach we prese...
Olivier Teste
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 6 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
CORR
2002
Springer
122views Education» more  CORR 2002»
13 years 7 months ago
On alternative approach for verifiable secret sharing
The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. T...
Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk