Existing protocols for archival systems make use of verifiability of shares in conjunction with a proactive secret sharing scheme to achieve high availability and long term confidentiality, besides data integrity. In this paper, we extend an existing protocol (Wong et al. [9]) to take care of more realistic situations. For example, it is assumed in the protocol of Wong et al. that the recipients of the secret shares are all trustworthy; we relax this by requiring that only a majority is trustworthy
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
Abstract—It is well known that the suitability of many crypto-graphic algorithms decreases with time...
Protocols for secure archival storage are becoming increasingly important as the use of digital stor...
We present a new protocol for verifiably redistributing secrets from an (m, n) threshold sharing sch...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m ′,n ′ ) acce...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
We present a new protocol for verifiably redistributing secrets from an (m,n) threshold sharing sche...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
[[abstract]]In this paper, we propose a verifiable multi-secret sharing scheme. Some secrets are pro...
Aiming to strengthen classical secret-sharing to make it a more directly useful primitive for human ...
Abstract — Modern storage systems are often faced with complex trade-offs between the confidentialit...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
Abstract—It is well known that the suitability of many crypto-graphic algorithms decreases with time...
Protocols for secure archival storage are becoming increasingly important as the use of digital stor...
We present a new protocol for verifiably redistributing secrets from an (m, n) threshold sharing sch...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m ′,n ′ ) acce...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
. A secret sharing scheme allows to share a secret among several participants such that only certain...
We present a new protocol for verifiably redistributing secrets from an (m,n) threshold sharing sche...
Secret Sharing is a fundamental notion for secure cryptographic design. In a Secret Sharing protocol...
Verifiable secret sharing (VSS) protocols enable parties to share secrets while guaranteeing securit...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
[[abstract]]In this paper, we propose a verifiable multi-secret sharing scheme. Some secrets are pro...
Aiming to strengthen classical secret-sharing to make it a more directly useful primitive for human ...
Abstract — Modern storage systems are often faced with complex trade-offs between the confidentialit...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
Abstract—It is well known that the suitability of many crypto-graphic algorithms decreases with time...