نتایج جستجو برای: secret sharing

تعداد نتایج: 100605  

Journal: :Pattern Recognition 2005
Rastislav Lukac Konstantinos N. Plataniotis

Journal: :SIAM J. Discrete Math. 1996
Wakaha Ogata Kaoru Kurosawa

Tompa and Woll considered a problem of cheaters in (k; n) threshold secret sharing schemes. We rst derive a tight lower bound on the size of shares jV i j for this problem: jV i j (jSj 1)= + 1, where V i denotes the set of shares of participant P i , S denotes the set of secrets, and denotes the cheating probability. We next present an optimum scheme which meets the equality of our bound by usi...

Journal: :Des. Codes Cryptography 2006
Mike J. Grannell Terry S. Griggs Anne Penfold Street

It is shown that in some cases it is possible to reconstruct a block design D uniquely from incomplete knowledge of a minimal defining set for D. This surprising result has implications for the use of minimal defining sets in secret sharing schemes. AMS classifications: Primary: 94A62, Secondary: 05B05.

Journal: :J. Inf. Sci. Eng. 2002
Ching-Nung Yang

Audio and optical cryptography schemes in [1] are secret sharing schemes that protect audio and visual secrets by using sounds and images, respectively. However, 2-out-of-n schemes in [1] are constructed by log 2 n independent 2-out-of-2 schemes, meaning so that a 2-out-of-n scheme needs log 2 n different cover sounds or images. More cover sounds (images) will be more difficult for the huma...

1996
Markus Stadler

A secret sharing scheme allows to share a secret among several participants such that only certain groups of them can recover it. Veri able secret sharing has been proposed to achieve security against cheating participants. Its rst realization had the special property that everybody, not only the participants, can verify that the shares are correctly distributed. We will call such schemes publi...

Journal: :Theor. Comput. Sci. 1997
Roberto Bagnara Patricia M. Hill Enea Zaffanella

Although the usual goal of sharing analysis is to detect which pairs of variables share, the standard choice for sharing analysis is a domain that characterizes set-sharing. In this paper, we question, apparently for the first time, whether this domain is over-complex for pair-sharing analysis. We show that the answer is yes. By defining an equivalence relation over the set-sharing domain we ob...

1995
Kaoru Kurosawa Satoshi Obana Wakaha Ogata

In this paper, we show that there exists a t-cheater identi able (k; n) threshold secret sharing scheme such as follows for cheating probability " > 0. If k 3t+ 1, then 1. Just k participants are enough to identify who are cheaters. 2. jV i j is independent of n. That is, jV i j = jSj(1=") (t+2) , where S denotes the set of secrets and V i denotes the set of shares of a participant P i , respec...

Journal: :IACR Cryptology ePrint Archive 2015
Seher Tutdere Osmanbey Uzunkol

Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret sharing schemes are improved by using some new bounds on the torsion limits of algebraic function fields. Furthermore, new bounds on the torsion limits of certain towers of function fields are given.

1997
Clifford Cocks

We show how it is possible for two parties to cooperate in generating the parameters for an RSA encryption system in such a w a y that neither individually has the ability to decrypt enciphered data. In order to decrypt data the two parties instead follow the cooperative procedure described.

Journal: :IACR Cryptology ePrint Archive 2002
Michael J. Collins

Padró and Sáez [PS] introduced the concept of a k-partite access structure for secret sharing and gave a complete characterization of ideal bipartite structures. We derive a necessary condition for ideal tripartite structures, which we conjecture is necessary for all k.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید