نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

Journal: :IACR Cryptology ePrint Archive 2015
Berry Schoenmakers Meilof Veeningen Niels de Vreede

Verifiable computation allows a client to outsource computations to a worker with a cryptographic proof of correctness of the result that can be verified faster than performing the computation. Recently, the Pinocchio system achieved faster verification than computation in practice for the first time. Unfortunately, Pinocchio and other efficient verifiable computation systems require the client...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

just as motivation is important in sla research, demotivation constitutes an important factor, too. there are many studies done on demotivation and burnout of teachers. many of these studies have been conducted on one or two aspects of english instruction. consequently, there are few studies which have been done on more than two aspects of english teaching. the aim of this study is to find out ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده کشاورزی 1390

abstract this study is carried out to determine the chemical composition in the three vegetative stages of the haloxylon sp., degradation parameters, with adding naoh and ca(oh2 ). for this purpose, in may and october and january 2010 enough some haloxylon sp. of the ammary area was prepared. crude protein and ash percentage are decrease, neutral detergent fiber percentage with pragress stage ...

Journal: :انسان پژوهی دینی 0
محمد جواد پیرمرادی دانشیار دانشگاه جامع امام حسین(ع)

transforming methodology from deduction to induction and finally its generalization from the realm of nature studies to the scope of human being one by a positivistic presupposition has led to modern humanities which have a charge to study human beings nature and behaviors scientifically. the main goal of the article is to show theoretical and practical insufficiency of this method in an islami...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

toury (1978:200) believes that translation is a kind of activity which inevitably involves at least two languages and two cultural traditions. being polite while asking for something takes place differently in different cultures and languages, therefore various strategies may be applied for making requests and also translation of them in order not to disturb or threaten the face or better to sa...

2013
David Bernhard Stephan Neumann Melanie Volkamer

Mixnets are one of the main approaches to deploy secret and verifiable electronic elections. General-purpose verifiable mixnets however suffer from the drawback that the amount of data to be verified by observers increases linearly with the number of involved mix nodes, the number of decryptors, and the number of voters. Chase et al. proposed a verifiable mixnet at Eurocrypt 2012 based on so-ca...

Journal: :IACR Cryptology ePrint Archive 2003
Kamil Kulesza Zbigniew Kotulski Josef Pieprzyk

The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. The participants interact (no third party involved) in order to check validity of their shares before they are pooled for secret recovery. Verification efficiency does not depend on the number of faulty participants.

1999
Berry Schoenmakers

A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme with the property that the validity of the shares distributed by the dealer can be verified by any party; hence verification is not limited to the respective participants receiving the shares. We present a new construction for PVSS schemes, which compared to previous solutions by Stadler and later by Fujisa...

Journal: :CoRR 2015
Hua Lu Jack Peterson

Verifiable secret sharing (VSS) schemes [1–3] rely on the assumption that parties can not reliably fabricate false secret shares which pass the verification process. Here, we show that, for certain VSS implementations that use verification commitments bounded to a finite field, this assumption is incorrect. Let there be n shares of a secret and a threshold of t secret shares required to get the...

2011
Nishant Doshi Devesh Jinwala

Threshold secret sharing schemes are used to divide a given secret by a dealer in parts such that no less than the threshold number of shareholders can reconstruct the secret. However, these schemes are susceptible to the malicious behavior of a shareholder or a dealer. To prevent such attacks, it is necessary to make a provision for verification of the integrity of the shares distributed by th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید