Sciweavers

21 search results - page 5 / 5
» Ideal Hierarchical Secret Sharing Schemes
Sort
View
CCS
2008
ACM
13 years 7 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig