Sciweavers

36 search results - page 1 / 8
» Robust Secret Sharing Schemes Against Local Adversaries
Sort
View
FOCS
2007
IEEE
14 years 5 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
INDOCRYPT
2003
Springer
14 years 4 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
SACRYPT
2004
Springer
14 years 4 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova
ACSAC
2008
IEEE
14 years 5 months ago
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries
Securely authenticating a human user without assistance from any auxiliary device in the presence of powerful passive adversaries is an important and challenging problem. Passive ...
Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang...
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 4 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall