Sciweavers

11 search results - page 2 / 3
» Linear Threshold Multisecret Sharing Schemes
Sort
View
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
14 years 2 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
ICICS
2004
Springer
13 years 10 months ago
Robust Metering Schemes for General Access Structures
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
DCC
2010
IEEE
13 years 5 months ago
Minimum distance of Hermitian two-point codes
In [8], the authors formulate new coset bounds for algebraic geometric codes. The bounds give improved lower bounds for the minumum distance of algebraic geometric codes as well a...
Seungkook Park
CSREAPSC
2006
13 years 6 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal
EUROCRYPT
2007
Springer
13 years 11 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan