نتایج جستجو برای: secret sharing

تعداد نتایج: 100605  

Journal: :IEEE Transactions on Information Theory 2016

Journal: :Physical Review A 2005

Journal: :Discrete Applied Mathematics 1997

Journal: :Journal of Mathematical Cryptology 2014

2009
Ilker Nadi Bozkurt Kamer Kaya Ali Aydin Selçuk

Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating parties using a secret sharing scheme (SSS). Several function sharing schemes have been proposed in the literature, with most of them using Shamir secret sharing as the unde...

Journal: :IACR Cryptology ePrint Archive 2003
Chunming Tang Zhuojun Liu Mingsheng Wang

In this paper, we first propose a protocol in which the prover can show that a = b holds for two committed integers a and b; also, we present a protocol in which the prover can prove that a 6= 0 holds for committed integer a; then, we construct a protocol to prove that the degree of a polynomial f(x) equals to t− 1 exactly, which has been as an open problem(see[21]); finally, we provide a proto...

2015
Wentao Huang Michael Langberg Joerg Kliewer Jehoshua Bruck

A secret sharing scheme is a method to store information securely and reliably. Particularly, in the threshold secret sharing scheme (due to Shamir), a secret is divided into shares, encoded and distributed to parties, such that any large enough collection of parties can decode the secret, and a smaller (then threshold) set of parties cannot collude to deduce any information about the secret. W...

Journal: :I. J. Network Security 2013
Atanu Basu Indranil Sengupta Jamuna Kanta Sing

In our proposed scheme, the participants are arranged in a hierarchical structure according to their position or rank and each first level participant as a parent node delegates his power to the lower level hierarchical group members. The group members help to reconstruct the secret shares of their parent nodes in their absence and the secret key is reconstructed even if at least one parent nod...

2010
Priyanka Koneru

In secret sharing scheme, the master secret and all the private shares (which are distributed by the dealer to the shareholders) are the two secrets which are to be maintained confidentially. In all the secret sharing schemes proposed till date, private shares are reused to reconstruct the master secret. But we proposed a new way of Proactive Secret Sharing Scheme in which, instead of renewing ...

2014
Anu john C. Manjula

In this paper for improving the security of data transmission we are introducing triple key chaotic encryption technique .In addition to this authentication method based on secret sharing technique with a data repair capability is being introduced. Using Shamir secret sharing scheme shares arebeing created from the authentication signal generated for each block of document image alongwith the b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید