- secret sharing scheme
- схема разделения секрета (секретной информации) между несколькими лицами
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Secret sharing — refers to any method for distributing a secret amongst a group of participants, each of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their … Wikipedia
Verifiable secret sharing — In cryptography, a secret sharing scheme is verifiable if auxiliary information is included that allows players to verify their shares as consistent. More formally, verifiable secret sharing ensures that even if the dealer is malicious there is a … Wikipedia
Shamir's Secret Sharing — is an algorithm in cryptography. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret.Counting on… … Wikipedia
Publicly Verifiable Secret Sharing — In cryptography, a secret sharing scheme is publicly verifiable (PVSS) if it is a verifiable secret sharing scheme and if any party involved can verify the validity of the shares distributed by the dealer.quotation In verifiable secret sharing… … Wikipedia
Commitment scheme — In cryptography, a commitment scheme allows one to commit to a value while keeping it hidden, with the ability to reveal the committed value later. Commitments are used to bind a party to a value so that they cannot adapt to other messages in… … Wikipedia
Blom's scheme — is a cryptographical symmetric threshold key exchange protocol.A trusted party gives each of the n participants a secret key and a public identifier, which enables any two participants to independently create a shared key for securely… … Wikipedia
Threshold shadow scheme — A threshold shadow scheme (also known as a threshold signature scheme or secret sharing ) is a form of secure multiparty computation in which a message is shared between several (N) people. Any piece of the message on its own is totally… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
George Blakley — is an American cryptographer, best known for inventing a secret sharing scheme in 1979. In order to split a secret into several shares, Blakley s scheme specifies the secret as a point in n dimensional space, and gives out shares that coorrespond … Wikipedia
Quantum Byzantine agreement — Byzantine fault tolerant protocols are algorithms that are robust to arbitrary types of failures in distributed algorithms. With the advent and popularity of the internet, there is a need to develop algorithms that do not require any centralized… … Wikipedia
Adi Shamir — Infobox Scientist name = Adi Shamir image width = 200px caption = At the CRYPTO 2003 conference birth date = 1952 birth place = Tel Aviv, Israel death date = death place = residence = Israel citizenship = nationality = ethnicity = field =… … Wikipedia