نتایج جستجو برای: multi stage secret sharing scheme
تعداد نتایج: 1080245 فیلتر نتایج به سال:
For mission-critical and safety-critical systems such as medical, financial, or administrative information systems, a secure and reliable storage system is indispensable. The main purpose of our research is to develop a highly secure and highly reliable storage system. We have proposed a storage system that utilizes a secret sharing scheme. The storage system is called the Secret Sharing Storag...
A disjunctive multi-level secret sharing scheme divides users into different levels. Each level L is associated with a threshold tL, and a group of users can only recover the secret if, for some L, there are at least tL users at levels 0....L in the group. We present a simple ideal disjunctive multi-level secret sharing scheme – in fact, the simplest and most direct scheme to date. It is the fi...
Many efficient secret sharing schemes for general access structures have been developed in efforts to deal with the problems of multi-party computations (MPC), threshold cryptography, and access control. In this paper, we have proposed a novel secret sharing scheme with general access structures that is based on the key-lock-pair mechanism. In our scheme, the dealer can assess a real situation ...
For a secret sharing scheme, two parameters dmin and dcheat are defined in [1] and [2]. These two parameters measure the errorcorrecting capability and the secret-recovering capability of the secret sharing scheme against cheaters. Some general properties of the parameters have been studied in [1-3]. The MDS secret-sharing scheme is defined in [2] and it is proved that MDS perfect secret sharin...
Visual Cryptography comes under cryptography domain. It deals with encrypting and decrypting of visual information like pictures, texts, videos etc. Multi Secret Image Sharing (MSIS) scheme is a part of visual cryptography that provides a protected method to transmit more than one secret images over a communication channel. Conventionally, transmission of a single secret image is possible over ...
We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself.
A , (m ) n threshold secret sharing scheme is a method for distributing a secret amongst a group of participants. In a , (m ) n threshold secret sharing scheme any m participants recover the secret, but no ) 1 ( m participants can [6]. Each of participants is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together [2]. In this paper, we ...
We first explain the notion of secret sharing and also threshold schemes, which can be implemented with the Shamir’s secret sharing. Subsequently, we review social secret sharing [6,10] and its trust function. In a secret sharing scheme, a secret is shared among a group of players who can later recover the secret. We review the construction of a social secret sharing scheme and its application ...
The ( ) , t n threshold secret sharing scheme proposed by Shamir (1979) encodes the secret key into n shares and those shares are distributed among the participants. Each share incorporates an x-value uniquely designated for every single participant. If the shares are distributed on insecure (or public) channels, malicious users may acquire a few (or all) shares. If the number of shares obtaine...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید