Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. Wong et al.[8] combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However their protocol requires that each of the receivers is honest during redistribution. We proposed[3] an extension to their protocol wherein we relaxed the requirement that all the recipients should be honest to the condition that only a simple majority amongst the recipients need to be honest during the re(distribution) processes. Further, both of these protocols make use of Feldman's approach for achie...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
CMU-CS-87-143f i) Many distributed systems manage some form of long-lived data, such as files or dat...
Many archival storage systems rely on keyed encryption to ensure privacy. A data object in such a sy...
Existing protocols for archival systems make use of verifiability of shares in conjunction with a pr...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
We present a new protocol for verifiably redistributing secrets from an (m, n) threshold sharing sch...
Aiming to strengthen classical secret-sharing to make it a more directly useful primitive for human ...
Abstract — Modern storage systems are often faced with complex trade-offs between the confidentialit...
Abstract—It is well known that the suitability of many crypto-graphic algorithms decreases with time...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m ′,n ′ ) acce...
We present a new protocol for verifiably redistributing secrets from an (m,n) threshold sharing sche...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
CMU-CS-87-143f i) Many distributed systems manage some form of long-lived data, such as files or dat...
Many archival storage systems rely on keyed encryption to ensure privacy. A data object in such a sy...
Existing protocols for archival systems make use of verifiability of shares in conjunction with a pr...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
We present a new protocol for verifiably redistributing secrets from an (m, n) threshold sharing sch...
Aiming to strengthen classical secret-sharing to make it a more directly useful primitive for human ...
Abstract — Modern storage systems are often faced with complex trade-offs between the confidentialit...
Abstract—It is well known that the suitability of many crypto-graphic algorithms decreases with time...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m ′,n ′ ) acce...
We present a new protocol for verifiably redistributing secrets from an (m,n) threshold sharing sche...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
CMU-CS-87-143f i) Many distributed systems manage some form of long-lived data, such as files or dat...
Many archival storage systems rely on keyed encryption to ensure privacy. A data object in such a sy...