Dynamic and Verifiable Hierarchical Secret Sharing
From MaRDI portal
Publication:2953806
DOI10.1007/978-3-319-49175-2_2zbMath1407.94176MaRDI QIDQ2953806
Giulia Traverso, Denise Demirel, Johannes A. Buchmann
Publication date: 6 January 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-49175-2_2
Birkhoff interpolation; cloud computing; distributed storage; long-term security; hierarchical secret sharing; dynamic secret sharing; proactive secret sharing
94A62: Authentication, digital signatures and secret sharing
Related Items
Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer, Quantum attribute-based encryption: a comprehensive study, Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness, Perennial secure multi-party computation of universal Turing machine, Fair hierarchical secret sharing scheme based on smart contract
Cites Work
- Hierarchical threshold secret sharing
- Improving the round complexity of VSS in point-to-point networks
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups
- How to share a secret
- Computational Verifiable Secret Sharing Revisited
- The round complexity of verifiable secret sharing and secure multicast
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item