Essays about: "Secret Sharing"

Showing result 6 - 10 of 25 essays containing the words Secret Sharing.

  1. 6. Secret Sharing with Threshold Schemes

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Håkan Johansson; [2020]
    Keywords : Secret; sharing; threshold; schemes; cheating; shadow; dealer; Shamir; Blakley; Mignotte; Asmuth-Bloom;

    Abstract : In this thesis, four different methods for secret sharing with threshold schemes will be investigated. We will discuss theory, implementation and security aspects. For example, we show how some known attacks are implemented.The methods considered in this thesis, are the schemes by Shamir, Blakley, Mignotte and Asmuth-Bloom. READ MORE

  2. 7. Multi-factor Authentication : System proposal and analysis of continuous authentication methods

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Markus Fält; [2020]
    Keywords : continuous authentication; machine learning;

    Abstract :  It is common knowledge that the average user has multiple online accounts which all require a password. Some studies have shown that the number password for the average user is around 25. Considering this, one can see that it is unreasonable to expect the average user to have 25 truly unique passwords. READ MORE

  3. 8. A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study

    University essay from Karlstads universitet/Handelshögskolan (from 2013)

    Author : Erik Framner; [2019]
    Keywords : Secret Sharing; multi-cloud; data storage; user interface; design; HCI; security; privacy; usability; trust; PRISMACLOUD;

    Abstract : Storing personal information in a secure and reliable manner may be crucial for organizational as well as private users. Encryption protects the confidentiality of data against adversaries but if the cryptographic key is lost, the information will not be obtainable for authorized individuals either. READ MORE

  4. 9. Automatic secret synchronisation across heterogeneous IT environments

    University essay from KTH/Hälsoinformatik och logistik

    Author : Johan Wedin; Filip Ek Johansson; [2019]
    Keywords : security; secrets; secret management; system integration; cryptography; computer security; säkerhet; hemligheter; hemlighetshantering; systemintegration; kryptografi; datasäkerhet;

    Abstract : Following circumstances such as mergers and acquisitions, the IT systemsassociated with the participating organisations may need to share access towardsservices and systems with eachother. Access towards systems and services is oftencontrolled using secret information such as passwords or keys. READ MORE

  5. 10. Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Nathanael Eneroth; [2018]
    Keywords : LTE; VoLTE; LBO; Lawful Intercept; Multiple Escrow Agents; Shamir’s Secret Sharing; LTE; VoLTE; LBO; laglig avlyssning; flera Escrow Agents ; Shamirs krypteringsmetod;

    Abstract : The fourth generation cellular mobile broadband, Long-Term Evolution (LTE), provides high speed Internet via Internet Protocol (IP). Today’s wireless infrastructure paves the way to a connected society where high speed Internet is seamlessly available at all times for anyone to use. READ MORE