Secret sharing: A comprehensive survey, taxonomy and applications

AK Chattopadhyay, S Saha, A Nag, S Nandi - Computer Science Review, 2024 - Elsevier
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …

A brief survey on secure multi-party computing in the presence of rational parties

Y Wang, T Li, H Qin, J Li, W Gao, Z Liu, Q Xu - Journal of Ambient …, 2015 - Springer
Intelligent agents (IA) are autonomous entities which observe through sensors and act upon
an environment using actuators to adjust their activities towards achieving certain goals. The …

Social secret sharing in cloud computing using a new trust function

M Nojoumian, DR Stinson - 2012 Tenth Annual International …, 2012 - ieeexplore.ieee.org
We first review the notion of social secret sharing and its trust function. We then illustrate
how this construction can be used in cloud computing to create a self-organizing …

Socio-rational secret sharing as a new direction in rational cryptography

M Nojoumian, DR Stinson - Decision and Game Theory for Security: Third …, 2012 - Springer
Rational secret sharing was proposed by Halpern and Teague in [8]. The authors show that,
in a setting with rational players, secret sharing and multiparty computation are only possible …

A rational hierarchical (t,n)-threshold quantum secret sharing scheme

F Li, Z Liu, L Liu, S Zhu - Quantum Information Processing, 2024 - Springer
Quantum secret sharing plays a crucial role in quantum cryptography. In this paper, we
present a rational hierarchical (t, n)-threshold quantum secret sharing scheme based on …

Novel secret sharing and commitment schemes for cryptographic applications

M Nojoumian - 2012 - uwspace.uwaterloo.ca
In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in
which shares are allocated based on a player's reputation and the way she interacts with …

Rational trust modeling

M Nojoumian - Decision and Game Theory for Security: 9th …, 2018 - Springer
Trust models are widely used in various computer science disciplines. The primary purpose
of a trust model is to continuously measure the trustworthiness of a set of entities based on …

Ideal social secret sharing using Birkhoff interpolation method

Z Eslami, N Pakniat… - Security and …, 2016 - Wiley Online Library
The concept of social secret sharing was introduced in 2010 by Nojoumian et al. In the
scheme of Nojoumian et al.(called SSS), the number of shares allocated to each party …

Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques

M Nojoumian - 2016 14th Annual Conference on Privacy …, 2016 - ieeexplore.ieee.org
In this paper, a new proactive verifiable secret sharing (PVSS) scheme is proposed in an
active mobile adversary setting. To the best of our knowledge, the only unconditionally …

[PDF][PDF] 理性安全多方计算研究

王伊蕾, 徐秋亮 - 密码学报, 2014 - jcr.cacrnet.org.cn
理性安全多方计算指的是带有理性参与者的安全多方计算. 它是博弈论和安全多方计算的一个
综合, 利用博弈论中的一些概念和方法解决安全多方计算中的某些问题. 不同于传统安全计算中 …