Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1024051 - MaRDI portal

scientific article; zbMATH DE number 1024051

From MaRDI portal
Publication:4341739

zbMath0871.94034MaRDI QIDQ4341739

Hugo Krawczyk

Publication date: 8 October 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (26)

How to Share a Secret, InfinitelyHigh-threshold AVSS with optimal communication complexitySecret-sharing for NPContinuously non-malleable secret sharing for general access structuresTimed-release computational secret sharing and threshold encryptionChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextA new threshold changeable secret sharing scheme based on the Chinese remainder theoremContinuously non-malleable secret sharing: joint tampering, plain model and capacitySharing many secrets with computational provable securityLong term confidentiality: a surveyAC-RRNS: anti-collusion secured data sharing scheme for cloud storageSecret sharing schemes for infinite sets of participants: a new design techniqueEvolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret SharingExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationProbabilistic secret sharingAll-or-nothing encryption and the package transformRearrangements of access structures and their realizations in secret sharing schemesLocalised multisecret sharingVerifiable Multi-secret Sharing Schemes for Multiple Threshold Access StructuresRevisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing SchemeGeneral information dispersal algorithmsThreshold changeable secret sharing schemes revisitedSecure distributed storage and retrievalNew efficient and secure protocols for verifiable signature sharing and other applicationsOn-line secret sharingNon-malleable secret sharing against bounded joint-tampering attacks in the plain model






This page was built for publication: