Secure distributed storage and retrieval
From MaRDI portal
Publication:1575652
DOI10.1016/S0304-3975(98)00263-1zbMath0944.68055MaRDI QIDQ1575652
Rosario Gennaro, Tal Rabin, Charanjit S. Jutla, Juan A. Garay
Publication date: 21 August 2000
Published in: Theoretical Computer Science (Search for Journal in Brave)
Related Items (4)
Byzantine disk paxos: optimal resilience with Byzantine shared memory ⋮ Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms ⋮ Secure distributed storage and retrieval ⋮ Scalable secure storage when half the system is faulty
Cites Work
- Probabilistic encryption
- Secure distributed storage and retrieval
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
- How to share a function securely
- Robust Threshold DSS Signatures
- How to share a secret
- Robust and Efficient Sharing of RSA Functions
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Efficient dispersal of information for security, load balancing, and fault tolerance
- A method for obtaining digital signatures and public-key cryptosystems
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- How to withstand mobile virus attacks (extended abstract)
- Distributed fingerprints and secure information dispersal
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Secure distributed storage and retrieval