نتایج جستجو برای: secret sharing schemes
تعداد نتایج: 198401 فیلتر نتایج به سال:
In traditional secret sharing schemes for general access structures, a secret can be encoded into n sets of (shadow, key)’s which are distributed to n participants one by one. Only those participants belonging to a pre-defined qualified subset can recover the shared secret by using their (shadow, key)’s. The size of (shadow, key)’s may be different for different participants. This problem exist...
Beimel, Tassa and Weinreb (2008) and Farras and Padro (2010) partially characterized weighted simple games that are access structures of ideal secret sharing schemes; they did this in terms of the operation of composition of simple games. They classified such indecomposable weighted games, and proved that any other weighted game, which is the access structure of an ideal secret sharing scheme, ...
In recent years there has been a great deal of work done on secret sharing schemes. Secret Sharing Schemes allow for the division of keys so that an authorised set of users may access information. In this paper we wish to present a critical comparison of two of these Schemes based on Latin Squares [3] and RSA [9]. These two protocols will be examined in terms of their positive and negative aspe...
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of parties (i.e., edges) can reconstruct the secret if it contains a path from node s to node t. We prove that in every linear secret sharing scheme realizing the st-con function on a directed graph with n edges the total size...
Recently, Li et al. [Phys. Rev. A, 82(2), 022303] presented two semi-quantum secret sharing (SQSS) protocols using GHZ-like states. The proposed schemes are rather practical because only the secret dealer requires to equip with advanced quantum devices such as quantum memory, whereas the other agents can merely perform classical operations to complete the secret sharing. However, this study poi...
In this paper, we describe secret sharing schemes. We discuss Room squares and their critical sets. We propose a model of secret sharing based on critical sets of Room squares.
A multi-secret sharing scheme is a protocol to share some arbitrarily related secrets among a set of participants. A novel ) , ( n k -threshold multi-secret sharing scheme based on an isomorphism is proposed in this paper. The maximum number of secrets that can be shared in the proposed scheme is 2 k which is larger than that of most existing efficient ) , ( n k -threshold multi-secret sharing ...
Hierarchical secret sharing schemes distribute a message to a set of shareholders with different reconstruction capabilities. In distributed storage systems, this is an important property because it allows to grant more reconstruction capability to better performing storage servers and vice versa. In particular, Tassa’s conjunctive and disjunctive hierarchical secret sharing schemes are based o...
With the rapid advancement of network technology, multimedia information is transmitted over the Internet conveniently. Various confidential data such as military maps and commercial identifications are transmitted over the Internet. While using secret images, security issues should be taken into consideration because hackers may utilize weak link over communication network to steal information...
Secret sharing deals with the problem of securely distributing confidential information among a certain number of users, in such a way that only some subsets of them are able to jointly decrypt it. Several schemes and variants of secret sharing have been proposed, from the seminal schemes of Shamir and Blakley, which are based respectively on polynomial interpolation, and hyperplanes intersecti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید