Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme
نویسندگان
چکیده
منابع مشابه
A (t,m,n)-Group Oriented Secret Sharing Scheme
Basic (t, n)-Secret Sharing (SS) schemes share a secret among n shareholders by allocating each a share. The secret can be reconstructed only if at least t shares are available. However, an adversary without a valid share may obtain the secret when more than t shareholders participate in the secret reconstruction. To address this problem, the paper 1). introduces the notion and gives the formal...
متن کاملStrong (n, t, n) verifiable secret sharing scheme
Article history: Received 15 December 2009 Received in revised form 14 April 2010 Accepted 17 April 2010
متن کامل(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
In a (t, n) secret sharing scheme (SS), a dealer divides the secret into n shares in such way that any t or more than t shares can reconstruct the secret but fewer than t shares cannot reconstruct the secret. The multi-SS is an extension of the (t, n) SS in which shares can be reused to reconstruct multiple secrets. Thus, the efficiency of the multi-SS is better than the efficiency of the (t, n...
متن کاملFace Recognition by using Feed Forward Back Propagation Neural Network
Face recognition technology has seen dramatic improvements in performance over the past decade, and such systems are now widely used for security and commercial applications. In this paper an improved approach has been used in which feed forward back propagation neural network is implemented through matlab. The results obtained shows that the proposed approach somewhat improves the performance ...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2016
ISSN: 1877-0509
DOI: 10.1016/j.procs.2016.02.032