Search

Your search keyword '"Verifiable secret sharing"' showing total 5,477 results

Search Constraints

Start Over You searched for: Descriptor "Verifiable secret sharing" Remove constraint Descriptor: "Verifiable secret sharing"
5,477 results on '"Verifiable secret sharing"'

Search Results

1. Proximity Gaps for Reed--Solomon Codes.

2. RaBFT: an improved Byzantine fault tolerance consensus algorithm based on raft.

4. Network-Agnostic Multi-party Computation Revisited (Extended Abstract)

5. FedPV-FS: A Feature Selection Method for Federated Learning in Insurance Precision Marketing

6. BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data Sharing.

7. Verifiable secret sharing with changeable access structure.

8. End-to-end data security with DMaya on IPFS: keyless secured private swarm for the closed user group.

9. VSS from Distributed ZK Proofs and Applications

10. Sigma Protocols from Verifiable Secret Sharing and Their Applications

12. Compartmented Proactive Secret Sharing Scheme

13. Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries.

14. Game-based security proofs for verifiable secret sharing schemes in the standard model.

15. On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience.

17. Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments

18. Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments.

19. Efficient Perfectly Secure Computation with Optimal Resilience.

20. Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System

21. Cloud Key Management Based on Verifiable Secret Sharing

22. History Binding Signature : (Extended Abstract)

23. A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme.

24. QSecret-Sharing Scheme (QSS)-Based Keyless: Titanium Secure (TitaniumSec) EMail Application

25. A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid.

26. VSS Made Simpler

27. Publicly verifiable threshold secret sharing based on three‐dimensional‐cellular automata.

28. Performing Computations on Hierarchically Shared Secrets

29. Dare‐to‐Share: Collaborative privacy‐preserving recommendations with (almost) no crypto.

30. Secret sharing: A comprehensive survey, taxonomy and applications.

31. Security of Verifiable Threshold Quantum Secret Sharing With Sequential Communication

32. Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data

33. Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap

34. Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data

35. VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning

36. A Verifiable Secret Sharing Approach for Secure MultiCloud Storage

37. Verifiable Privacy-Preserving Scheme Based on Vertical Federated Random Forest

38. VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings

40. Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing

41. Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression

42. Secure, Privacy Preserving, and Verifiable Federating Learning Using Blockchain for Internet of Vehicles

43. An Efficient E2E Crowd Verifiable E-Voting System

44. Software-Defined Security-by-Contract for Blockchain-Enabled MUD-Aware Industrial IoT Edge Networks

45. VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things

46. Adaptive Observation-Based Efficient Reinforcement Learning for Uncertain Systems

47. A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

48. AntNest: Fully Non-Interactive Secure Multi-Party Computation

49. AFast PubliclyVerifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions.

50. RSU authentication in vehicular ad hoc networks base on verifiable secret sharing.

Catalog

Books, media, physical & digital resources