Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A (t,m,n)-Group Oriented Secret Sharing Scheme

Basic (t, n)-Secret Sharing (SS) schemes share a secret among n shareholders by allocating each a share. The secret can be reconstructed only if at least t shares are available. However, an adversary without a valid share may obtain the secret when more than t shareholders participate in the secret reconstruction. To address this problem, the paper 1). introduces the notion and gives the formal...

متن کامل

Strong (n, t, n) verifiable secret sharing scheme

Article history: Received 15 December 2009 Received in revised form 14 April 2010 Accepted 17 April 2010

متن کامل

(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial

In a (t, n) secret sharing scheme (SS), a dealer divides the secret into n shares in such way that any t or more than t shares can reconstruct the secret but fewer than t shares cannot reconstruct the secret. The multi-SS is an extension of the (t, n) SS in which shares can be reused to reconstruct multiple secrets. Thus, the efficiency of the multi-SS is better than the efficiency of the (t, n...

متن کامل

Face Recognition by using Feed Forward Back Propagation Neural Network

Face recognition technology has seen dramatic improvements in performance over the past decade, and such systems are now widely used for security and commercial applications. In this paper an improved approach has been used in which feed forward back propagation neural network is implemented through matlab. The results obtained shows that the proposed approach somewhat improves the performance ...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2016

ISSN: 1877-0509

DOI: 10.1016/j.procs.2016.02.032