Dynamic and Verifiable Hierarchical Secret Sharing
From MaRDI portal
Publication:2953806
DOI10.1007/978-3-319-49175-2_2zbMath1407.94176OpenAlexW2550604170MaRDI QIDQ2953806
Giulia Traverso, Denise Demirel, Johannes A. Buchmann
Publication date: 6 January 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-49175-2_2
Birkhoff interpolationcloud computingdistributed storagelong-term securityhierarchical secret sharingdynamic secret sharingproactive secret sharing
Related Items (5)
Quantum attribute-based encryption: a comprehensive study ⋮ Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness ⋮ Perennial secure multi-party computation of universal Turing machine ⋮ Fair hierarchical secret sharing scheme based on smart contract ⋮ Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
Cites Work
- Hierarchical threshold secret sharing
- Improving the round complexity of VSS in point-to-point networks
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups
- How to share a secret
- Computational Verifiable Secret Sharing Revisited
- The round complexity of verifiable secret sharing and secure multicast
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Dynamic and Verifiable Hierarchical Secret Sharing