Dynamic and Verifiable Hierarchical Secret Sharing (Q2953806): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Computational Verifiable Secret Sharing Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication-Optimal Proactive Secret Sharing for Dynamic Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5202624 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The round complexity of verifiable secret sharing and secure multicast / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3839198 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343446 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improving the round complexity of VSS in point-to-point networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3689094 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical threshold secret sharing / rank
 
Normal rank

Latest revision as of 06:03, 13 July 2024

scientific article
Language Label Description Also known as
English
Dynamic and Verifiable Hierarchical Secret Sharing
scientific article

    Statements

    Dynamic and Verifiable Hierarchical Secret Sharing (English)
    0 references
    0 references
    0 references
    0 references
    6 January 2017
    0 references
    dynamic secret sharing
    0 references
    hierarchical secret sharing
    0 references
    distributed storage
    0 references
    cloud computing
    0 references
    long-term security
    0 references
    Birkhoff interpolation
    0 references
    proactive secret sharing
    0 references

    Identifiers