نتایج جستجو برای: sharing
تعداد نتایج: 87406 فیلتر نتایج به سال:
A publicly verifiable secret sharing scheme is more applicable than a verifiable secret sharing because of the property that the validity of the shares distributed by the dealer can be verified by any party. In this paper, we construct a non-interactive and informationtheoretic publicly verifiable secret sharing by a computationally binding and unconditionally hiding commitment scheme and zero-...
F iscal regime is one of the main differences between petroleum contracts. Fiscal regimes in oil contracts are divided to two main categories namely Concessionary and Contractual Systems. In contractual systems, the main difference between service and production sharing contracts is the way of compensation of contractor services which could be in cash or in kind. In production sharin...
T his study aims to demonstrate that joining in risk sharing network leads to the reduction in incomes volatility. In this respect, income variance for a group of members in an informal insurance is modelled in which income variance prior to joining risk sharing network and after joining is analyzed statistically. A Monte Carlo simulation technique is used to prove the result. To extend an...
The present research is conducted to show that organizations can use wiki to attract customers' purchase intention inside the e-commerce context. Considering the relation between wiki and ecommerce for CRM, this research tries to explore the characteristics such as perceived risk, customer experience, knowledge sharing culture, trust and knowledge sharing in wiki tool impact on purchase intenti...
Microgrids are nowadays used to produce electric energy with more efficiency and advantage. However, the use of microgrids presents some challenges. One of the main problems of the microgrids widely used in electrical power systems is the control of voltage, frequency and load sharing balance among inverter- based distributed generators (DGs) in islanded mode. Droop method performance degra...
In this paper we propose an optimistic two-party fair exchange protocol which does not rely on a centralized trusted third party. Instead, the fairness of the protocol relies on the honesty of part of the neighbor participants. This new concept, which is based on a generic verifiable secret sharing scheme, is particularly relevant in networks where centralized authority can neither be used on-l...
In this paper, we introduce a new efficient technique allowing to render an off-line e-cash system traceable without need to a trusted party. The main idea is the use of the publicly verifiable secret sharing technique in order to revoke the anonymity of double spending users. The anonymity of honest users is still provided. Security analysis shows that the proposed technique does not undermine...
the purpose of this article is to investigate the uniqueness of meromorphic functions sharing five small functions on annuli.
This paper studies the methods for changing thresholds in the absence of secure channels after the setup of threshold secret sharing schemes. First, we construct a perfect (t, n) threshold scheme that is threshold changeable to t ′ > t , which is optimal with respect to the share size. This improves the scheme of Wang and Wong by relaxing the requirement from q ≥ n + v to q > n with the secret-...
In this paper a secret sharing scheme based on the word problem in groups is introduced. The security of the scheme and possible variations are discussed in section 2. The article concludes with the suggestion of two categories of platform groups for the implementation of the scheme.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید