نتایج جستجو برای: verifiable secret sharing

تعداد نتایج: 103953  

2014
Giulia Alberini Tal Moran Alon Rosen

We introduce a new framework for polling responses from a large population. Our framework allows gathering information without violating the responders’ anonymity and at the same time enables public verification of the poll’s result. In contrast to prior approaches to the problem, we do not require trusting the pollster for faithfully announcing the poll’s results, nor do we rely on strong iden...

2008
Roberto Araújo

Voting is an important tool for modern societies. It is fundamental for the democracy. This mechanism must be fair and accurate. However, threats intrinsic in the voting process may compromise these requisites. In conventional voting, dishonest talliers may corrupt the ballot box, for instance. Remote voting has more threats due to the uncontrolled environment. In this work, we propose secure p...

2010
Nicola Gatti Mattia Monga Sabrina Sicari

Wireless Sensor Networks (WSNs) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and clone: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing the reliability of node localization data from a game theoretical viewp...

2008
Silvio Micali

Rational secret sharing is a fundamental primitive at the intersection of cryptography and game theory. In essence, a dealer wishes to engineer a communication game that, when rationally played, guarantees that each of the players learns the dealer’s secret. Yet, all solutions so far were quite inefficient and relied on the players’ beliefs and not just on their rationality. After providing a m...

Journal: :CoRR 2013
Qiwei Lu Wenchao Huang Xudong Gong Xingfu Wang Yan Xiong Fuyou Miao

With the rapid development of MANET, secure and practical authentication is becoming increasingly important. The existing works perform the research from two aspects, i.e., (a)secure key division and distributed storage, (b)secure distributed authentication. But there still exist several unsolved problems. Specifically, it may suffer from cheating problems and fault authentication attack, which...

Journal: :Theoretical Computer Science 2022

Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent decades, researchers have many improvement schemes. Among all these schemes, verifiable multi-secret (VMSS) schemes are studied sufficiently, which share multiple secrets simultaneously and perceive malicious dealer as well participants. By pointing out that presented by Dehkordi Mashhadi 2008 cann...

2013
Sonali Patil Nikita Rana Dhara Patel Prajol Hodge

The Secret Sharing scheme assumes long-lived shares. However the protection provided for such long lived and sensitive shares may be insufficient. The security in a system that is exposed to attacks and break-ins might become exhausted. The goal of the pro-active security scheme is to prevent the adversary from learning the secret or from destroying it. The Shamir’s Secret Sharing is pioneer me...

Journal: :I. J. Network Security 2015
Bin Feng Cheng Guo Mingchu Li Zhi-Hui Wang

A proactive secret sharing scheme is a method of sharing a secret among a set of participants. And, the corresponding shadows can be periodically renewed under the premise of never changing the shared secret. However, in the most existing proactive secret sharing schemes, only one secret can be shared during one secret sharing process. The proposed scheme describes PMSS, a new way to share mult...

2007
Yi-Chun Wang Justie Su-tzu Juan

A secret sharing scheme is a method to distribute a secret among a set of participants, such that only qualified subsets of the participants can recover the secret. A secret sharing scheme is perfect if any unqualified subset obtains no information regarding the master key. The collection of qualified subsets is called access structure. In a hypergraph, if the size of edges is equal to r, the h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید