Password-protected secret sharing (PPSS) schemes allow a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. In particular, this secret will remain safe as long as not too many servers get corrupted. However, servers are not always reliable and the communication can be altered. To address this issue, a robust PPSS should additionally guarantee that a user can recover his secret as long as enough servers provide correct answers, and these are received without alteration.In this paper, we propose new robust PPSS schemes which are significantly more efficient than the existing ones. We achieve ...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
International audiencePassword-protected secret sharing (PPSS) schemes allow a user to publicly shar...
Password-Protected Secret-Sharing (PPSS) schemes (parameterized by t and n) are a type of cryptograp...
We present TOPPSS, the most efficient Password-Protected Secret Sharing (PPSS) scheme to date. A (t;...
In 2010, Resch and Plank proposed a computationally secure secret sharing scheme, called AONT-RS. We...
Abstract. Password-Authenticated Key Exchange allows users to generate a strong cryptographic key ba...
Secret sharing has been study for many years and has had a number of real-word applications. There a...
Abstract. Running the key-management service of cryptographic sys-tems in the cloud is an attractive...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
We show a robust secret sharing scheme for a maximal threshold t < n/2 that features an optimal over...
Password-authenticated secret sharing (PASS) schemes, first introduced by Bagherzandi et al. at CCS ...
A password protected secret sharing (PPSS ) allows a user to store shares of a secret on a set of L ...
[[abstract]]A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
International audiencePassword-protected secret sharing (PPSS) schemes allow a user to publicly shar...
Password-Protected Secret-Sharing (PPSS) schemes (parameterized by t and n) are a type of cryptograp...
We present TOPPSS, the most efficient Password-Protected Secret Sharing (PPSS) scheme to date. A (t;...
In 2010, Resch and Plank proposed a computationally secure secret sharing scheme, called AONT-RS. We...
Abstract. Password-Authenticated Key Exchange allows users to generate a strong cryptographic key ba...
Secret sharing has been study for many years and has had a number of real-word applications. There a...
Abstract. Running the key-management service of cryptographic sys-tems in the cloud is an attractive...
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the...
We show a robust secret sharing scheme for a maximal threshold t < n/2 that features an optimal over...
Password-authenticated secret sharing (PASS) schemes, first introduced by Bagherzandi et al. at CCS ...
A password protected secret sharing (PPSS ) allows a user to store shares of a secret on a set of L ...
[[abstract]]A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme...
Passwords have become the most ubiquitous form of client-server authentication on the Internet nowad...
We prove that a known approach to improve Shamir’s celebrated secret sharing scheme; i.e., adding an...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...