A password protected secret sharing (PPSS ) allows a user to store shares of a secret on a set of L servers, and use a single password to authenticate itself to any subset of k servers at a later time to access the shares and reconstruct the secret. Security of PPSS ensures that a coalition of up to k- 1 servers cannot reveal any information about the secret message or the password. A related primitive is threshold password authenticated key exchange protocol (TPAKE ) that allows a user to establish individual authenticated shared secret keys with members of a subset of k out of L servers, using a single password. These primitives are well motivated, with applications such as secure storage of secret keys, and secure group communication usi...
The most challenging application of post-quantum cryptography (PQC) is the distribution of provably ...
Shamir\u27s Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharin...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares an...
Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast...
Quantum secret sharing is an important branch of quantum cryptography, and secure multi-party quantu...
Part 8: Cryptography (Short Papers)International audienceThis paper presents a new construction of a...
Authentication has been adopted in many areas, but most of these authentication schemes are built us...
Public-key encryption allows anyone to encrypt messages that only the intended recipient can decrypt...
Authentication has been adopted in many areas, but most of these authentication schemes are built us...
Group encryption (GE), the encryption analog of group signatures, is a fundamental primitive that of...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
Shamir\u27s Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharin...
The most challenging application of post-quantum cryptography (PQC) is the distribution of provably ...
Shamir\u27s Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharin...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
Public-key cryptography is an indispensable component used in almost all of our present-day digital ...
Privacy and control over data have become a public concern. Simultaneously, the increasing likelihoo...
Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares an...
Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast...
Quantum secret sharing is an important branch of quantum cryptography, and secure multi-party quantu...
Part 8: Cryptography (Short Papers)International audienceThis paper presents a new construction of a...
Authentication has been adopted in many areas, but most of these authentication schemes are built us...
Public-key encryption allows anyone to encrypt messages that only the intended recipient can decrypt...
Authentication has been adopted in many areas, but most of these authentication schemes are built us...
Group encryption (GE), the encryption analog of group signatures, is a fundamental primitive that of...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
Shamir\u27s Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharin...
The most challenging application of post-quantum cryptography (PQC) is the distribution of provably ...
Shamir\u27s Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharin...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...