• Lightweight cryptographic protocols for mobile devices 

    Albakri, Ashwag Othman (2020)
    In recent years, a wide range of resource-constrained devices have been built and integrated into many networked systems. These devices collect and transfer data over the Internet in order for users to access the data or ...
  • A New Strong Proactive Verifiable Secret Sharing Scheme with Unconditional Security 

    Koneru, Priyanka, 1987- (University of Missouri--Kansas City, 2010)
    In secret sharing scheme, the master secret and all the private shares (which are distributed by the dealer to the shareholders) are the two secrets which are to be maintained confidentially. In all the secret sharing ...
  • Protected Secret Sharing and its Application to Threshold Cryptography 

    Mannava, Spandan (University of Missouri--Kansas City, 2016)
    In the secret reconstruction of Shamir’s (t,n) secret sharing scheme (SS), shares released by shareholders need to be protected otherwise, non-shareholders can also obtain the secret. Key establishment protocol can ...