Sciweavers

56 search results - page 1 / 12
» Secret Sharing Made Short
Sort
View
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
13 years 9 months ago
Secret Sharing Made Short
Hugo Krawczyk
FOCS
2007
IEEE
13 years 11 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
INFOCOM
2011
IEEE
12 years 8 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi
EUROPKI
2007
Springer
13 years 11 months ago
On Partial Anonymity in Secret Sharing
Abstract. Anonymous secret sharing schemes allow a secret to be recovered from shares regardless of the identity of shareholders. Besides being interesting in its own right, this p...
Vanesa Daza, Josep Domingo-Ferrer
CCS
2007
ACM
13 years 11 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik