Sciweavers

380 search results - page 25 / 76
» Intrusion-Resilient Secret Sharing
Sort
View
SDMW
2004
Springer
15 years 3 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
15 years 2 months ago
Secret Sharing Made Short
Hugo Krawczyk
CRYPTO
1995
Springer
100views Cryptology» more  CRYPTO 1995»
15 years 1 months ago
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, M...