Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
The small smile of secret sharing left Breslau's face but only for an instant before he recovered.
Barnes also might have mentioned one solution to the problem of the corruptible system administrator: "secret sharing."
Secret sharing is an important primitive in several protocols for secure multiparty computation.
Verifiable secret sharing can be used to build an end-to-end auditable voting systems.
Secret sharing is used as a term to refer to ways of sharing a secret among many people.
Secret sharing is also called secret splitting, key splitting, and split knowledge.
Verifiable secret sharing is important for secure multiparty computation.
Secret sharing may be used.
Homomorphic secret sharing - A simplistic decentralized voting protocol.
For large secrets, it may be more efficient to encrypt the secret and then distribute the key using secret sharing.
In anthropology secret sharing is one way for men and women to establish traditional relations with other men and women.
"Generalized oblivious transfer by secret sharing".
One example where secret sharing is used is the RSA crytosystem.
Secret sharing.
And the deepest of those secret sharings are with the child figure, the earliest stories of course, and with the women.
Homomorphic secret sharing is used to transmit a secret to several recipients as follows:
Secret sharing and Public Key authentication methods in addition to basic password-based authentication.
The vivid renderings of human prisons that we find in Dubliners are intensified, I have argued by secret sharings.
Some more 'theoretical' cryptosystems include interactive proof systems, (like zero-knowledge proofs), systems for secret sharing, etc.
(See secret sharing)
Secret sharing consists of recovering a secret S from a set of shares, each containing partial information about the secret.
Secret sharing was invented independently by Adi Shamir and George Blakley in 1979.
More formally, verifiable secret sharing ensures that even if the dealer is malicious there is a well-defined secret that the players can later reconstruct.
A number of variant systems have been proposed which remove the escrow including certificate-based encryption, secret sharing, secure key issuing cryptography and certificateless cryptography.
SEPIA A java library for SMC using secret sharing.