Essays about: "secret sharing schemes"
Found 4 essays containing the words secret sharing schemes.
-
1. Homomorphic Encryption for Audio Conferencing
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE
-
2. Publicly Auditable Privacy Revocation in Practice
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : PAPR Credentials is the name of a not yet published credential scheme that provides conditional privacy for its users. This means that an administrator can choose to revoke a user's anonymity. READ MORE
-
3. Secret Sharing with Threshold Schemes
University essay from Linnéuniversitetet/Institutionen för matematik (MA)Abstract : In this thesis, four different methods for secret sharing with threshold schemes will be investigated. We will discuss theory, implementation and security aspects. For example, we show how some known attacks are implemented.The methods considered in this thesis, are the schemes by Shamir, Blakley, Mignotte and Asmuth-Bloom. READ MORE
-
4. Discreet Discrete Mathematics : Secret Communication Using Latin Squares and Quasigroups
University essay from Umeå universitet/Institutionen för matematik och matematisk statistikAbstract : This thesis describes methods of secret communication based on latin squares and their close relative, quasigroups. Different types of cryptosystems are described, including ciphers, public-key cryptosystems, and cryptographic hash functions. There is also a chapter devoted to different secret sharing schemes based on latin squares. READ MORE