Secret sharing

Proactive secret sharing

Proactive secret sharing is an underlying technique in Proactive Security Protocols. It is a method to update distributed keys (shares) in a secret sharing scheme periodically such that an attacker has less time to compromise shares and as long as the attacker visits less than a threshold or a quorum group, the system remains secure. This contrasts to a non-proactive scheme where if the threshold number of shares are compromised during the lifetime of the secret, the secret is compromised. The model which takes time constraints into account was originally suggested as an extension of the notion of Byzantine fault tolerance where redundancy of sharing allows robustness into the time domain (periods) and was proposed by Rafail Ostrovsky and Moti Yung in 1991. The method has been used in the areas of cryptographic protocols in secure multi-party computation and in threshold cryptosystems. (Wikipedia).

Video thumbnail

Secret Sharing - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Keeping Secrets: Cryptography In A Connected World

Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to

From playlist Explore the World Science Festival

Video thumbnail

Understanding Private Browsing

In this video, you’ll learn tips for browsing the web privately. Visit https://edu.gcfglobal.org/en/techsavvy/browsing-privately/1/ to learn even more. We hope you enjoy!

From playlist Internet Tips

Video thumbnail

Secret Sharing Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

NOTACON 9: Collaboration. You keep using that word... (EN) | Enh. audio

Speaker: Angela Harms Sure. You collaborate every day at work, right? Except you don't. Because collaboration is not the same as cooperation. Cooperation is where everybody does their part. Collaboration creates a solution that's more than the sum of those parts. Cooperation helps us cho

From playlist Notacon 9

Video thumbnail

What are common scams I should be aware of?

While online scams vary, many of them have certain features that help to identify them from legitimate online communications. Learn how to recognize and avoid some common types of scams.

From playlist Internet Safety

Video thumbnail

Cryptography: Codes, Ciphers, and Connections

The encryption of information is as old as information itself. Ever since two people wanted to pass something along, so has there been a third party who wanted to be privy to it. This back and forth battle of creating codes, breaking them, and finding new ones has been happening quietly fo

From playlist Mathematics

Video thumbnail

25c3: Collapsing the European security architecture

Speaker: Gipfelsoli More security-critical behaviour in Europe! At the latest since 9/11, the EU took severe changes in their home affairs policy. New agreements and institutions were created to facilitate police networking (Europol, Frontex, CEPOL, new databases and their shared access)

From playlist 25C3: Nothing to hide

Video thumbnail

26C3: DDoS/botnet mitigation & hosting online communities 5/6

Clip 5/6 Speaker: rodent Many years of hosting BBS's, ISP's, websites, game servers, forums, irc networks, and online communities. I've accrued experience dealing with the negative influences of DoS/DDoS, botnets, trolls, flooders, spammers, phishers, and the whole lot. I want to talk

From playlist 26C3: Here be dragons day 3

Video thumbnail

DEFCON 18: Xploiting Yoville and Facebook for Fun and Profit 3/3

Speakers: Strace, Sean Barnum, EvilAdamSmith, Kanen, Joey Tyson Maybe you've played YoVille because your spouse or relative got you into it. Maybe its your overt obsession or secret delight. If you haven't heard of YoVille, well, its got at least 5 Million active users connected directl

From playlist DEFCON 18-3

Video thumbnail

Strata Jumpstart 2011: James Kobielus, "NBA (Next Best Action) for MBAs"

James Kobielus Senior Analyst, Forrester Research, Inc. James Kobielus is a leading expert on Big Data, as well as on such enabling technologies as enterprise data warehousing, advanced analytics, Hadoop, cloud services, database management systems business process management, business

From playlist Strata NY 2011

Video thumbnail

Is It OK to Keep Secrets From Your Partner?

We’re taught that love requires honesty, and that secrets are anathema to healthy relationships. But there may be very noble reasons for concealing things from our partner - and instances where it is far kinder to lie than reveal hurtful truths. Sign up to our mailing list to receive 10% o

From playlist RELATIONSHIPS

Video thumbnail

How To Protect Your Online Privacy With A Threat Model | Tutorial 2022

Privacy tutorial with a threat model methodology. This will help you achieve strong privacy consistently and reliably. Support independent research: https://www.patreon.com/thehatedone Privacy tools are inconsistent. The inventory of recommended countermeasures changes all the time. On t

From playlist Security by compartmentalization - learn to protect your privacy effectively

Video thumbnail

CERIAS Security: Provable security in mobile ad hoc networks 3/6

Clip 3/6 Speaker: Mike Burmester · Florida State Mobile ad hoc networks (MANETs) are collections of wireless mobile nodes with links that are made or broken in an arbitrary way. Communication is achieved via routes whose node relay packets. Several routing algorithms have been propose

From playlist The CERIAS Security Seminars 2006

Video thumbnail

Caltech Energy 10 — Katie Rae, Supporting Early Stage Climate Tech Companies — 6/14/2022

Caltech Energy 10 (CE10) brings together key leaders in engineering, science, industry and government to provide a wide audience with information, data, and inspiration on why and how to reach a 50% reduction in the emission of global warming gases (GWG) within the decade. The energy ecosy

From playlist Sustainability

Video thumbnail

Web App Vulnerabilities - DevSecOps Course for Beginners

In this DevSecOps course, you will learn how to take advantage of common web vulnerabilities, how to fix those vulnerabilities, and how to use DevSecOps tools to make sure your applications (and containers) are secure. You will also learn all about DevSecOps. 💻 Get the goof example app sh

From playlist DevOps Courses

Video thumbnail

The “Secret” to Acquiring Tons of Backlinks [7.3]

In this video, you’ll learn the little-known secret to acquiring backlinks. *************************************** Additional Blogging Resources Blogging For Business Course (Complete Playlist) ► https://www.youtube.com/watch?v=y5kQXogrLN0&list=PLvJ_dXFSpd2tbI3mYhAO8oZ2NYMrJuNPq&index=1

From playlist Blogging for Business Course

Video thumbnail

6 Mindsets That Make People Attracted To You Immediately

6 Mindsets That Will Make You Magnetic (Animated) Discover The 4 Emotions You Need To Make a Killer First Impression: http://bit.ly/2sGNRnQ Subscribe to Charisma On Command’s YouTube Account: http://bit.ly/COC-Subscribe Check out After Skool: https://www.youtube.com/channel/UC1KmNKYC1l

From playlist Top Charisma on Command Videos

Video thumbnail

Facebook: Understanding Privacy

In this video, you’ll learn more about how Facebook privacy works. Visit https://www.gcflearnfree.org/facebook101/understanding-facebook-privacy/1/ for our text-based lesson. This video includes information on: • Understanding basic privacy settings • Sharing and privacy • Facebook privac

From playlist Internet Safety

Related pages

Key management | Secret sharing | Key generation | Threshold cryptosystem | Shamir's Secret Sharing | Adversary (cryptography) | Key (cryptography) | Secure multi-party computation | Key distribution