2018
DOI: 10.1201/9780429466335
|View full text |Cite
|
Sign up to set email alerts
|

Handbook of Applied Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
1,598
0
171

Year Published

2018
2018
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 1,110 publications
(1,771 citation statements)
references
References 0 publications
2
1,598
0
171
Order By: Relevance
“…Data splitting algorithms require combining all n shares of the split secret to reproduce the split information. If n − 1 shares are combined, information I will not be reproduced [8].…”
Section: Splitting and Sharing Algorithms For Secure Informationmentioning
confidence: 99%
“…Data splitting algorithms require combining all n shares of the split secret to reproduce the split information. If n − 1 shares are combined, information I will not be reproduced [8].…”
Section: Splitting and Sharing Algorithms For Secure Informationmentioning
confidence: 99%
“…Data privacy in Farsite is rooted in symmetric-key and public-key cryptography [27], and data reliability is rooted in replication. When a client writes a file, it encrypts the data using the public keys of all authorized readers of that file, and the encrypted file is replicated and distributed to a set of untrusted file hosts.…”
Section: Background -The Farsite File Systemmentioning
confidence: 99%
“…An unconditionally trusted entity has access to all secret keys and must be trusted to protect these keys from compromise. [3] 9.Ei2-3 key KPs to create C. The receiver Bob decrypts the ciphertext message received from sender Alice by decrypting C with D and his private key KSB to obtain the original message M. Note that even though Alice created the encrypted message, she cannot decrypt it since she does not have access to Bob's private key; only Bob can decrypt C. Alice i P…”
Section: Asymmetric Cryptographymentioning
confidence: 99%
“…A functionally trusted entity is assumed to be trustworthy; however, unconditional trust is not required since this entity does not have access to the private keys. [3] user's public key bound to the identity of the key owner (e.g., Bob). Note that unlike symmetric key distribution, the CA may distribute public key certificates via an unprotected public channel.…”
Section: Figure 4 Asymmetric Cryptographymentioning
confidence: 99%
See 1 more Smart Citation