Changing Thresholds in the Absence of Secure Channels

نویسندگان

  • Keith M. Martin
  • Josef Pieprzyk
  • Reihaneh Safavi-Naini
  • Huaxiong Wang
چکیده

The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there are no secure channels. First we motivate the problem and discuss methods of threshold change when the dealer is still active and can use broadcasting to implement This work was supported by the European Commission under ACTS project AC095 (ASPeCT) This work was partially supported by the Australian Research Council under grant number A49703076 Appeared in Proceedings of the 4th Australasian Conference on Information Security and Privacy (ACISP 1999), Lecture Notes in Computer Science 1587, J. Pieprzyk, R. Safavi-Naini, and J. Seberry (eds.), Springer-Verlag, pp. 177–191, 1999. c ©1999 Springer-Verlag

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...

متن کامل

Secure Communication in Shotgun Cellular Systems

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

متن کامل

The effectiveness of humor skills training in changing positive and negative affects evoked during conflict in coples with secure-insecure attatchment style

The use of humour in couple relationships is one of the constructive methods that help them to regulate their emotion. The aim of the present study was to determine the effectiveness of humour communication skills training in changing positive and negative emotions evoked during the conflict in couples with secure-insecure anxious attachment style. The present study is an experimental design wi...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Changing the Physiological Response and Water Relationships in Sweet Pepper When Stopping the Activity of Root Aquaporin in Drought Stress

Aquaporins are the main proteins in the plasma membrane, which facilitates the movement of water, carbon dioxide, and other small soluble material through the membrane. The aim of this study was to investigate the role of root acuporine on the physiological, biochemical and biochemical changes and water relations under drought stress. For this purpose, a study was conducted in a completely rand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Australian Computer Journal

دوره 31  شماره 

صفحات  -

تاریخ انتشار 1999