نتایج جستجو برای: secret sharing

تعداد نتایج: 100605  

Journal: :Des. Codes Cryptography 2002
Jaume Martí-Farré Carles Padró

2010
Neil Ireson Grégoire Burel

For eCollaboration to be effective, especially where it attempts to promote true collective decision-making, it is necessary to consider how knowledge is shared. The paper examines the knowledge sharing literature from the perspective of eCollaboration and discusses the critical challenges, principally the motivation of knowledge sources and maintenance of semantics, and describes how technique...

Journal: :J. Inf. Sci. Eng. 1999
Hung-Min Sun Shiuh-Pyng Shieh

A perfect secret sharing scheme allows a secret K to be shared among a set of participants in such a way that only qualified subsets of participants can recover the secret, and unqualified subsets of participants obtain no information regarding the secret. In this paper, we propose a construction of perfect secret sharing schemes with uniform, generalized access structures of rank 3. Compared w...

2000
Hossein Ghodosi Josef Pieprzyk

The commonly used technique for cheating detection requires that extra information be given to each participant. However, in a secret sharing scheme when the size of shares increases the security of the system degrades. In this paper we study the cheating problem in Shamir's scheme (in the sense of Tompa and Woll 1] attack) and present alternative solutions to this problem. First we consider ch...

Journal: :CoRR 2013
Bren Cavallo Delaram Kahrobaei

In this paper we review the Habeeb-Kahrobaei-Shpilrain secret sharing scheme [5] and introduce a variation based on the shortlex order on a free group. Drawing inspiration from adjustments to classical schemes, we also present a method that allows for the protocol to remain secure after multiple secrets are shared.

2006
Yimin Yu Saif Benjaafar Yigal Gerchak

We analyze the benefit of service capacity pooling for a set of independent firms. Firms have the choice of either operating their own service facilities or investing in a facility that is shared. Firms decide on capacity levels to minimize delay and capacity investment costs. If firms decide to operate a shared facility they must also decide on a scheme for sharing the cost of capacity and on ...

2011
Oriol Farràs Carles Padró

This paper is a survey of the main results and open problems in a line of work that was initiated shortly after secret sharing was introduced. Namely, the construction of ideal linear secret sharing schemes for access structures that are natural generalizations of the threshold ones and have interesting properties for the applications. Some of them have hierarchical properties, while other ones...

1997
Liqun Chen Dieter Gollmann Chris J. Mitchell Peter R. Wild

2000
Chin-Chen Chang Chwei-Shyong Tsai Tung-Shou Chen

If an image can be converted into a point in plane or space, lots of image problems can be considered based on geometric and vector theory. In this paper, the “image to point” conversion via complex number basis is proposed. Combined with the existing threshold access structures scheme, it leads to proposal of using number based secret sharing schemes in color images sharing.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید