Efficient threshold password-authenticated secret sharing protocols for cloud computing
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a secret s amongst n servers and protect it with a password pw, so that the client can later recover the secret s from any subset of t of the servers using the password pw. In this paper, we present two ef...
Saved in:
Main Authors: | Yi, Xun, Tari, Zahir, Hao, Feng, Chen, Liqun, Liu, Joseph K., Yang, Xuechao, Lam, Kwok-Yan, Khalil, Ibrahim, Zomaya, Albert Y. |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/142881 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Generic construction of ElGamal-type attribute-based encryption schemes with revocability and dual-policy
by: XU, Shengmin, et al.
Published: (2019) -
Privacy-preserving weighted federated learning within the secret sharing framework
by: Zhu, Huafei, et al.
Published: (2021) -
Finding flaws from password authentication code in Android apps
by: MA, Siqi, et al.
Published: (2019) -
n PAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
by: WAN, Zhiguo, et al.
Published: (2009) -
Full threshold change range of threshold changeable secret sharing
by: Ding, Jian, et al.
Published: (2023)