Lecture 2 : Statistical Authentication and Secret Sharing
نویسنده
چکیده
منابع مشابه
Notes on Secret Sharing
These are lecture notes from the first two lectures in Fall 2016, focusing on technical material we saw for secret sharing (including a proof by reduction using the hybrid proof technique). The notes do not include the general introduction to the course and modern crypto, as well as some discussion and motivation for secret sharing. Also not covered here is Shamir’s secret sharing, which we saw...
متن کاملOn the Security of a Cheating Immune Visual Secret Sharing Scheme
Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identification, steganography, and image encryption. Moreover, VSS schemes provide the secure services in communications. In 2010, De Prisco and De Santis deeply discussed the problem of cheating in VSS, gave t...
متن کاملA Review on an Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentica...
متن کاملAmended Biometric Authentication using Secret Sharing
Visual cryptography is a secret sharing scheme where a secret image gets divided into number of pieces called shares and not a single share disclose any information about secret image. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically ana...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017