نتایج جستجو برای: multi stage secret sharing scheme

تعداد نتایج: 1080245  

2016
Raman Kumar

Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity and computational overhead of improved CCH1 and ...

Journal: :Finite Fields and Their Applications 2014

Journal: :Journal of Fundamental Mathematics and Applications (JFMA) 2019

2002

In the paper we propose general framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying secret sharing scheme. ASGS allows to prevent the dealer from knowing the secret or even to eliminate him at all. Two situations are discussed. First concerns simultaneous generation and sharing of the random, prior nonexistent secret. Such a secret remains unkno...

Journal: :I. J. Network Security 2016
Qiao Peng Youliang Tian

Using multiple linear of multilinear map, we propose a simple, non-interactive and effective publicly verifiable secret sharing (PVSS) scheme based on multilinear DiffieHellman assumption (MDH). Up to now, the publicly verifiable of secret sharing is still an issue. In this paper, we set the sharing secret is a multiple linear pairing, we apply the multiple linear property of multilinear map fo...

2011
Ignacio Cascudo Ronald Cramer Chaoping Xing

An (n, t, d, n−t)-arithmetic secret sharing scheme (with uniformity) for Fq over Fq is an Fq-linear secret sharing scheme where the secret is selected from Fq and each of the n shares is an element of Fq. Moreover, there is t-privacy (in addition, any t shares are uniformly random in Fq) and, if one considers the d-fold “component-wise” product of any d sharings, then the d-fold component-wise ...

Journal: :CoRR 2015
Saurabh Bora Aparajita Ojha

It has been observed that the contrast values for (2, 3) VSS scheme, (2, 4) VSS scheme, (3, 5) VSS scheme and (4, 5) VSS scheme claimed by Wu and Sun (2013) are incorrect. Since the same values are cited and compared by many other researchers in their works, we have calculated and presented the correct values of contrast in this note.

2007
Shang-Kuan Chen

A Visual Cryptography (VC)-based system for sharing multiple secret images is proposed. Several weighted transparencies are generated so that people can reveal multiple secret images by stacking qualified subsets of some transparencies together. The transparency with relatively larger weight decides which secret image will be revealed. The proposed method has the following characteristics: deco...

2012
Sonali Patil Prashant Deshmukh E. D. Karnin J. W. Greene Chunming Tang Zheng-an Yao Yung-Chen Chou Chih-Hung Lin Pao-Ching Li Yu-Chiang Li Runhua Shi Hong Zhong Chao-Wen Chan Chin-Chen Chang Zhi-Hui Wang Mitsuru Ito Akira Saito Takao Nishizeki K. Srinathan N. Tharani Rajan

The idea of secret sharing is to start with a secret, divide it into pieces called shares, which are then distributed amongst participants by the dealer. Only certain authorized subsets of participants can reconstruct the original secret. Applications for secret sharing schemes seem to be getting more important nowadays. For many circumstances, secret sharing has to provide more flexibility and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید