Performing computations on hierarchically shared secrets
From MaRDI portal
Publication:1653229
DOI10.1007/978-3-319-89339-6_9zbMath1423.94110OpenAlexW2794659436MaRDI QIDQ1653229
Denise Demirel, Giulia Traverso, Johannes A. Buchmann
Publication date: 17 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-89339-6_9
Birkhoff interpolationcloud computingverifiable secret sharingauditingmulti-party computationdistributed storage systemshierarchical secret sharing
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (3)
Evolving homomorphic secret sharing for hierarchical access structures ⋮ On actively secure fine-grained access structures from isogeny assumptions ⋮ Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
This page was built for publication: Performing computations on hierarchically shared secrets