Threshold secret sharing schemes encode data into several shares such that a threshold number of shares can be used to recover the data. Such schemes provide confidentiality of stored data without using encryption, thus avoiding the problems associated with key management. To provide long-term confidentiality, proactive secret sharing techniques can be used, where shares are refreshed or renewed periodically so that an adversary who obtains fewer than the threshold shares in each time period does not learn any information on the encoded data. Share renewal is an expensive process, in terms of the computation and network communication involved. In the proactive model, this share renewal process must complete as soon as possible so that an ad...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a t...
We present the design of a distributed store that offers various levels of security guarantees whil...
This paper addresses the problem of using proactive cryptosystems for generic data storage and retri...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedi...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
Secret sharing (SS) is a cryptographic method proposed independently by Adi Shamir and George Blakle...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a t...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a t...
We present the design of a distributed store that offers various levels of security guarantees whil...
This paper addresses the problem of using proactive cryptosystems for generic data storage and retri...
The secure storage of long-lived sensitive data is constantly growing in its relevance due to the ev...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedi...
Secret sharing-based distributed storage systems can provide long-term protection of confidentiality...
Threshold secret sharing schemes enable a dealer to share a secret among $n$ parties such that only ...
Proactive secret sharing deals with refreshing secret shares, i.e., redistributing the shares of a s...
Secret sharing (SS) is a cryptographic method proposed independently by Adi Shamir and George Blakle...
We present a new protocol for the verifiable redistribution of secrets from (m,n) to (m # ,n # ) acc...
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which sha...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a t...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in a t...
We present the design of a distributed store that offers various levels of security guarantees whil...
This paper addresses the problem of using proactive cryptosystems for generic data storage and retri...