Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Threshold Cryptography

Encyclopedia of Information Science and Technology, Fourth Edition
Security operations such as encryption, decryption, signature generation and verification can be performed by a group of processes without reconstructing the shared secret. Threshold cryptography utilizes (k, n) threshold schemes internally.
Published in Chapter:
Intrusion Tolerance Techniques
Wenbing Zhao (Cleveland State University, USA)
Copyright: © 2018 |Pages: 10
DOI: 10.4018/978-1-5225-2255-3.ch427
Abstract
We believe that the research and development of intrusion tolerant systems will gain more momentum as more and more services are offered online. The expectation of such services is high, considering their essential roles in everyday operations of businesses and individuals as well. The impact of service unavailability and security breaches will only be more serious. In this chapter, we will survey the state of the art techniques for building intrusion tolerant systems. We will also illustrate a few most urgent open issues for future research. Finally, we point out that to build secure and dependable systems, we need a concerted effort in intrusion prevention, intrusion detection, and intrusion tolerance.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Consistency Is Not Enough in Byzantine Fault Tolerance
Basic cryptographic operations such as encryption, decryption, signature generation, and verification are performed by a group of processes without reconstructing the shared secret.
Full Text Chapter Download: US $37.50 Add to Cart
Consistency Is Not Enough in Byzantine Fault Tolerance
Basic cryptographic operations such as encryption, decryption, signature generation, and verification are performed by a group of processes without reconstructing the shared secret.
Full Text Chapter Download: US $37.50 Add to Cart
Intrusion Tolerance in Information Systems
Security operations such as encryption, decryption, signature generation, and verification can be performed by a group of processes without reconstructing the shared secret. Threshold cryptography utilizes (k, n) threshold schemes internally.
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Intrusion Tolerance Techniques
Security operations such as encryption, decryption, signature generation and verification can be performed by a group of processes without reconstructing the shared secret. Threshold cryptography utilizes (k, n) threshold schemes internally.
Full Text Chapter Download: US $37.50 Add to Cart
Enhancing Service Integrity of Byzantine Fault Tolerant Applications
Basic cryptographic operations such as encryption, decryption, signature generation, and verification are performed by a group of processes without reconstructing the shared secret.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR