ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Fair Private Block Encryption Protocol with Proactive Secret Sharing for Delegated Node of Public Blockchain
Jouranl of Information and Security
◽
10.33778/kcsa.2020.20.4.177
◽
2020
◽
Vol 20
(4)
◽
pp. 177-186
Author(s):
Seung Wook Jung
◽
Keyword(s):
Secret Sharing
◽
Proactive Secret Sharing
◽
Block Encryption
Download Full-text
Related Documents
Cited By
References
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation
Lecture Notes in Computer Science - From Database to Cyber Security
◽
10.1007/978-3-030-04834-1_23
◽
2018
◽
pp. 470-486
Author(s):
Karim Eldefrawy
◽
Rafail Ostrovsky
◽
Moti Yung
Keyword(s):
Secret Sharing
◽
Secure Multiparty Computation
◽
Multiparty Computation
◽
Proactive Secret Sharing
◽
Mobile Target
◽
Theoretical Foundations
Download Full-text
Proactive Secret Sharing with a Dishonest Majority
Lecture Notes in Computer Science - Security and Cryptography for Networks
◽
10.1007/978-3-319-44618-9_28
◽
2016
◽
pp. 529-548
◽
Cited By ~ 8
Author(s):
Shlomi Dolev
◽
Karim ElDefrawy
◽
Joshua Lampkins
◽
Rafail Ostrovsky
◽
Moti Yung
Keyword(s):
Secret Sharing
◽
Proactive Secret Sharing
Download Full-text
On Proactive Secret Sharing Schemes
Selected Areas in Cryptography - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30564-4_22
◽
2004
◽
pp. 308-325
◽
Cited By ~ 13
Author(s):
Ventzislav Nikov
◽
Svetla Nikova
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Proactive Secret Sharing
Download Full-text
Secure publicly verifiable and proactive secret sharing schemes with general access structure
Information Sciences
◽
10.1016/j.ins.2016.10.040
◽
2017
◽
Vol 378
◽
pp. 99-108
◽
Cited By ~ 13
Author(s):
Samaneh Mashhadi
Keyword(s):
Secret Sharing
◽
Secret Sharing Schemes
◽
Access Structure
◽
General Access Structure
◽
Proactive Secret Sharing
Download Full-text
A Secured Data Transmission Method using Enhanced Proactive Secret Sharing Scheme to Prevent Blackhole Attack in Manets- A Review
International Journal of Computer Applications
◽
10.5120/21104-3827
◽
2015
◽
Vol 119
(10)
◽
pp. 20-28
Author(s):
Jasmeen Kaur
◽
Tanupreet Singh
Keyword(s):
Secret Sharing
◽
Data Transmission
◽
Secret Sharing Scheme
◽
Transmission Method
◽
Sharing Scheme
◽
Blackhole Attack
◽
Proactive Secret Sharing
◽
Secured Data
Download Full-text
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments
Codes, Cryptology and Information Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-16458-4_11
◽
2019
◽
pp. 171-194
◽
Cited By ~ 1
Author(s):
Matthias Geihs
◽
Lucas Schabhüser
◽
Johannes Buchmann
Keyword(s):
Secret Sharing
◽
Large Data
◽
Proactive Secret Sharing
Download Full-text
VPSS: a verifiable proactive secret sharing scheme in distributed systems
IEEE Military Communications Conference, 2003. MILCOM 2003.
◽
10.1109/milcom.2003.1290219
◽
2004
◽
Cited By ~ 2
Author(s):
S. Pramanik
◽
S. Upadhyaya
Keyword(s):
Distributed Systems
◽
Secret Sharing
◽
Secret Sharing Scheme
◽
Sharing Scheme
◽
Proactive Secret Sharing
Download Full-text
Mobile proactive secret sharing
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing - PODC '08
◽
10.1145/1400751.1400856
◽
2008
◽
Cited By ~ 15
Author(s):
David A. Schultz
◽
Barbara Liskov
◽
Moses Liskov
Keyword(s):
Secret Sharing
◽
Proactive Secret Sharing
Download Full-text
A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing
International Journal of Computer and Communication Engineering
◽
10.17706/ijcce.2016.5.3.196-205
◽
2016
◽
Vol 5
(3)
◽
pp. 196-205
Author(s):
Yuesheng Zhu
◽
◽
Bojun Wang
◽
Cheng Cai
Keyword(s):
Smart Card
◽
Secret Sharing
◽
Authentication Scheme
◽
Proactive Secret Sharing
Download Full-text
Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography
2017 International Conference on Inventive Computing and Informatics (ICICI)
◽
10.1109/icici.2017.8365362
◽
2017
◽
Cited By ~ 1
Author(s):
N Chaitanya Kumar
◽
Abdul Basit
◽
Priyadarshi Singh
◽
V. Ch. Venkaiah
Keyword(s):
Elliptic Curve
◽
Secret Sharing
◽
Elliptic Curve Cryptography
◽
Proactive Secret Sharing
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close