Submitted in Partial Fulfillment of the Requirements for the Degree Of
نویسنده
چکیده
Verifiable secret sharing is a cryptographic primitive used in many distributed applications. To engineer realistic applications, it is beneficial to have dynamically changing shares and shareholder groups. Proactive secret sharing schemes deal with dynamically changing shares. Secret redistribution schemes solve issues of both dynamically changing shares and shareholder groups. In this dissertation, we identify the shortcomings of the traditional proactive secret sharing model and propose a new model, Dynamic Secret Redistribution, that allows for dynamically changing thresholds and group sizes. We describe this model for both synchronous and asynchronous systems and also develop dynamic secret redistribution schemes in accordance with these models.
منابع مشابه
Thesis Submitted in Partial Fulfillment of the requirement for the Degree of M.A/M. Sc In School consultant
Goal: The aim of this study is assess and compare emotional ability of deaf. Semi _ deaf and hearing students (14 _ 20) in Mashhad. Method: To do this experiment out of studies evidence generally 105 students selecting randomly. From each group, choose the number of normal boys and girls 35, deaf boys and girls and semi deaf boys and girls .this article is useful and explanatory .in this stud...
متن کاملاثربخشی آموزش ابراز وجود فرهنگمحور بر عزتنفس فرزندان طلاق
Brever, M.M.( 2010).The effects of child gender and child age at the time of parental divorce on the development. COLLEGE OF SOCIAL AND BEHAVIORAL SCIENCES, Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Psychology Educational Track.
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملProactive Threat Management for Securing Software Systems Abstract of the Thesis Submitted to the University of Delhi in Partial Fulfillment of the Requirements for the Award of the Degree of Doctor of Philosophy
OF THE THESIS SUBMITTED TO THE UNIVERSITY OF DELHI IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY
متن کاملComputationally Intelligent Watermarking for Securing Fingerprint Images ABSTRACT OF THE THESIS SUBMITTED TO THE UNIVERSITY OF DELHI IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY BY
OF THE THESIS SUBMITTED TO THE UNIVERSITY OF DELHI IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004