- Applied mathematics
- >
- Cryptography
- >
- Key management
- >
- Secret sharing

- Applied mathematics
- >
- Cryptography
- >
- Theory of cryptography
- >
- Secret sharing

- Cryptography
- >
- Key management
- >
- Key pre-distribution
- >
- Secret sharing

Commitment scheme

A commitment scheme is a cryptographic primitive that allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value lat

Proactive secret sharing

Proactive secret sharing is an underlying technique in Proactive Security Protocols. It is a method to update distributed keys (shares) in a secret sharing scheme periodically such that an attacker ha

Shamir's Secret Sharing

Shamir's Secret Sharing (SSS) is an efficient secret sharing algorithm for distributing private information (the "secret") in such a way that no individual holds intelligible information about the sec

Blom's scheme

Blom's scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom in a series of articles in the early 1980s. A trusted party

Secret sharing

Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when

© 2023 Useful Links.