Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals combine their 'shares', the secret may be reconstructed. Whereas insecure secret sharing allows an attacker to gain more information with each share, secure secret sharing is 'all or nothing' (where 'all' means the necessary number of shares). In one type of secret sharing scheme there is one dealer and n players. The dealer gives a share of the secret to the players, but only when specific conditions are fulfilled will the players be able to reconstruct the secret from their shares. The dealer accomplishes this by giving each player a share in such a way that any group of t (for threshold) or more players can together reconstruct the secret but no group of fewer than t players can. Such a system is called a (t, n)-threshold scheme (sometimes it is written as an (n, t)-threshold scheme). Secret sharing was invented independently by Adi Shamir and George Blakley in 1979. (Wikipedia).
Keeping Secrets: Cryptography In A Connected World
Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to
From playlist Explore the World Science Festival
Secret Sharing Solution - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Secret Sharing - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Understanding Private Browsing
In this video, you’ll learn tips for browsing the web privately. Visit https://edu.gcfglobal.org/en/techsavvy/browsing-privately/1/ to learn even more. We hope you enjoy!
From playlist Internet Tips
Is It OK to Keep Secrets From Your Partner?
We’re taught that love requires honesty, and that secrets are anathema to healthy relationships. But there may be very noble reasons for concealing things from our partner - and instances where it is far kinder to lie than reveal hurtful truths. Sign up to our mailing list to receive 10% o
From playlist RELATIONSHIPS
The Secrets of Other People's Relationships
Those of us in relationships suffer from an ignorance of what other people’s relationships are really like. We should recognise that episodes of difficulty and ambivalence are not the exception, but the norm. Sign up to our mailing list to receive 10% off your first order with us: https:/
From playlist RELATIONSHIPS
There’s a lot constantly going in the fantasy part of our minds that sounds pretty strange and at times, frankly, shocking. But coming to terms with our fantasies – and realising they are not our reality – belongs to the art of knowing how to live more easily with ourselves. If you like o
From playlist SELF
Cryptography: Codes, Ciphers, and Connections
The encryption of information is as old as information itself. Ever since two people wanted to pass something along, so has there been a third party who wanted to be privy to it. This back and forth battle of creating codes, breaking them, and finding new ones has been happening quietly fo
From playlist Mathematics
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
From playlist Computer - Cryptography and Network Security
Nexus Trimester - Salim El Rouayheb (Illinois Institute of Technology)
Secret Sharing in Distributed Storage Systems Salim El Rouayheb (Illinois Institute of Technology) February 15, 2016 Abstract: Distributed storage systems (DSSs) store large amount of data and make it accessible online, anywhere and anytime. To protect against data loss, the data in DSSs
From playlist Nexus Trimester - 2016 - Fundamental Inequalities and Lower Bounds Theme
Some Secure Computation concepts by Manoj Prabhakaran
DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.
From playlist Foundational Aspects of Blockchain Technology 2020
Nexus Trimester - Moni Naor (Wezimann Institute of Science)
How to Share a Secret, Infinitely Moni Naor (Wezimann Institute of Science) March 31, 2016 Abstract: Secret sharing schemes allow a dealer to distribute a secret piece of information among several parties such that only qualified subsets of parties can reconstruct the secret. The collecti
From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme
Breaking the Circuit-Size Barrier in Secret Sharing - Vinod Vaikuntanathan
Computer Science/Discrete Mathematics Seminar I Topic: Breaking the Circuit-Size Barrier in Secret Sharing Speaker: Vinod Vaikuntanathan Affiliation: MIT Date: October 15, 2018 For more video please visit http://video.ias.edu
From playlist Mathematics
Half a million secrets | Frank Warren
http://www.ted.com "Secrets can take many forms -- they can be shocking, or silly, or soulful." Frank Warren, the founder of PostSecret.com, shares some of the half-million secrets that strangers have mailed him on postcards. TEDTalks is a daily video podcast of the best talks and perfo
From playlist TED Talk Tuesdays @ Caltech
DEFCON 16: Keeping Secret Secrets Secret and Sharing Secret Secrets Secretly
Speaker: Vic Vandal, 504 / NOLAB / NC2600 Have you ever wanted to: •Transmit secret codes and messages •Protect Nuclear launch codes •Dabble in Intellectual Property protection •Warez/file-sharing with legal liability protection •Develop and share terrorist plots •Smuggle illegal substan
From playlist DEFCON 16
Nexus trimester - Omri Weinstein (Courant Institute (NYU)) 2/6
Some Some Information-Theoretic Problems in Theoretical Computer Science - Part II February 04, 2016 Abstract: In this informal talk, I will present and shortly discuss a few long-standing open problems in theoretical computer science (TCS), including Secret-Sharing, Multi-terminal commu
From playlist Nexus Trimester - 2016 - Distributed Computation and Communication Theme
Barry Sanders: Spacetime replication of continuous-variable quantum information
Abstract: Combining the relativistic speed limit on transmitting information with linearity and unitarity of quantum mechanics leads to a relativistic extension of the no-cloning principle called spacetime replication of quantum information. We introduce continuous-variable spacetime-repli
From playlist Mathematical Physics
NOTACON 9: Collaboration. You keep using that word... (EN) | Enh. audio
Speaker: Angela Harms Sure. You collaborate every day at work, right? Except you don't. Because collaboration is not the same as cooperation. Cooperation is where everybody does their part. Collaboration creates a solution that's more than the sum of those parts. Cooperation helps us cho
From playlist Notacon 9
From playlist My Maths Videos