نتایج جستجو برای: secret sharing
تعداد نتایج: 100605 فیلتر نتایج به سال:
Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating parties using a secret sharing scheme (SSS). Several function sharing schemes have been proposed in the literature, with most of them using Shamir secret sharing as the unde...
In this paper, we first propose a protocol in which the prover can show that a = b holds for two committed integers a and b; also, we present a protocol in which the prover can prove that a 6= 0 holds for committed integer a; then, we construct a protocol to prove that the degree of a polynomial f(x) equals to t− 1 exactly, which has been as an open problem(see[21]); finally, we provide a proto...
A secret sharing scheme is a method to store information securely and reliably. Particularly, in the threshold secret sharing scheme (due to Shamir), a secret is divided into shares, encoded and distributed to parties, such that any large enough collection of parties can decode the secret, and a smaller (then threshold) set of parties cannot collude to deduce any information about the secret. W...
In our proposed scheme, the participants are arranged in a hierarchical structure according to their position or rank and each first level participant as a parent node delegates his power to the lower level hierarchical group members. The group members help to reconstruct the secret shares of their parent nodes in their absence and the secret key is reconstructed even if at least one parent nod...
In secret sharing scheme, the master secret and all the private shares (which are distributed by the dealer to the shareholders) are the two secrets which are to be maintained confidentially. In all the secret sharing schemes proposed till date, private shares are reused to reconstruct the master secret. But we proposed a new way of Proactive Secret Sharing Scheme in which, instead of renewing ...
In this paper for improving the security of data transmission we are introducing triple key chaotic encryption technique .In addition to this authentication method based on secret sharing technique with a data repair capability is being introduced. Using Shamir secret sharing scheme shares arebeing created from the authentication signal generated for each block of document image alongwith the b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید