Secret sharing - The alternate security methodology

Secret Sharing - taking data and using randomisation to compute different shares (numbers) that only together define the secret/data - could be evolved to become a full-blown authentication protocol says Shlomi Dolev

by Shlomi Dolev

To access this content please sign in or register below for free

SIGN IN

Forgotten password?

Having trouble signing in?

Contact Customer Support at
scsupport@haymarket.com
or call 020 8267 8121

REGISTER NOW FOR FREE

REGISTRATION BENEFITS

  • Full access to feature, opinion and review content
  • The weekly SC Newswire bulletin
  • The Buyers' Guide of the latest products, and salary survey

Create an account now

Upcoming Events