Sciweavers

225 search results - page 11 / 45
» Weakly-Private Secret Sharing Schemes
Sort
View
ACISP
2004
Springer
13 years 11 months ago
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
Abstract. In this paper we propose an optimistic two-party fair exchange protocol which does not rely on a centralized trusted third party. Instead, the fairness of the protocol re...
Gildas Avoine, Serge Vaudenay
AINA
2005
IEEE
14 years 1 months ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 6 months ago
A provably secure secret handshake with dynamic controlled matching
Abstract A Secret Handshake is a protocol that allows two users to mutually verify one another’s properties, and in case of simultaneous matching, to share a key used to secure s...
Alessandro Sorniotti, Refik Molva
TPDS
1998
94views more  TPDS 1998»
13 years 7 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
IJNSEC
2008
85views more  IJNSEC 2008»
13 years 7 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He