Search for dissertations about: "secret sharing"

Showing result 1 - 5 of 11 swedish dissertations containing the words secret sharing.

  1. 1. Topics in Authentication Theory

    Author : Christian Gehrmann; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; polynomial evaluation; anonymous secret sharing; multiround authentication; group authentication; threshold cryptography; MAC; secret sharing; cryptology; Authentication; authentication codes; Systems engineering; computer technology; Data- och systemvetenskap;

    Abstract : Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e. READ MORE

  2. 2. Outsourcing Computations to a Cloud That You Don't Trust

    Author : Georgia Tsaloli; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; differential privacy; function secret sharing; homomorphic secret sharing; verifiable computation; privacy-preservation; public verifiability;

    Abstract : In many application scenarios, data need to be collected, stored and processed. Often sensitive data are collected from IoT devices, which are constrained regarding their resources, and, thus, remote, untrusted cloud servers are required to perform the computations. READ MORE

  3. 3. Tinkering the Wicked Problem of Privacy : Design Challenges and Opportunities for Crypto-based Services

    Author : Ala Sarah Alaqra; Simone Fischer-Hübner; Erik Wästlund; Steven Furnell; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Data privacy; wicked problems; user-centered design; privacy enhancing technologies; human factors; malleable signatures; secret sharing; homomorphic encryption; Computer Science; Datavetenskap;

    Abstract : Data privacy has been growing in importance in recent years, especially with the constant increase of online activity. Consequently, researchers study, design, and develop solutions aimed at enhancing users' data privacy. The wicked problem of data privacy is a dynamic challenge that defies straightforward solutions. READ MORE

  4. 4. Secure and Privacy-Preserving Cloud-Assisted Computing

    Author : Georgia Tsaloli; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; differential privacy; decentralization; verifiability; privacy-preservation; secure aggregation; secret sharing; cloud computing; privacy;

    Abstract : Smart devices such as smartphones, wearables, and smart appliances collect significant amounts of data and transmit them over the network forming the Internet of Things (IoT). Many applications in our daily lives (e.g., health, smart grid, traffic monitoring) involve IoT devices that often have low computational capabilities. READ MORE

  5. 5. Experimental multiuser secure quantum communications

    Author : Jan Bogdanski; Mohamed Bourennane; Nobuyuki Imoto; Stockholms universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Quantum key distribution; multiparty quantum secret sharing; Sagnac interferometer; “plug play” QKD; Passive Optical Network PON ; decoy states; single mode fiber birefringence compensation; quantum bit error rate; visibility; Physics; Fysik; fysik; Physics;

    Abstract : We are currently experiencing a rapid development of quantum information, a new branch of science, being an interdisciplinary of quantum physics, information theory, telecommunications, computer science, and many others. This new science branch was born in the middle of the eighties, developed rapidly during the nineties, and in the current decade has brought a technological breakthrough in creating secure quantum key distribution (QKD), quantum secret sharing, and exciting promises in diverse technological fields. READ MORE