نتایج جستجو برای: secret sharing
تعداد نتایج: 100605 فیلتر نتایج به سال:
For eCollaboration to be effective, especially where it attempts to promote true collective decision-making, it is necessary to consider how knowledge is shared. The paper examines the knowledge sharing literature from the perspective of eCollaboration and discusses the critical challenges, principally the motivation of knowledge sources and maintenance of semantics, and describes how technique...
A perfect secret sharing scheme allows a secret K to be shared among a set of participants in such a way that only qualified subsets of participants can recover the secret, and unqualified subsets of participants obtain no information regarding the secret. In this paper, we propose a construction of perfect secret sharing schemes with uniform, generalized access structures of rank 3. Compared w...
The commonly used technique for cheating detection requires that extra information be given to each participant. However, in a secret sharing scheme when the size of shares increases the security of the system degrades. In this paper we study the cheating problem in Shamir's scheme (in the sense of Tompa and Woll 1] attack) and present alternative solutions to this problem. First we consider ch...
In this paper we review the Habeeb-Kahrobaei-Shpilrain secret sharing scheme [5] and introduce a variation based on the shortlex order on a free group. Drawing inspiration from adjustments to classical schemes, we also present a method that allows for the protocol to remain secure after multiple secrets are shared.
We analyze the benefit of service capacity pooling for a set of independent firms. Firms have the choice of either operating their own service facilities or investing in a facility that is shared. Firms decide on capacity levels to minimize delay and capacity investment costs. If firms decide to operate a shared facility they must also decide on a scheme for sharing the cost of capacity and on ...
This paper is a survey of the main results and open problems in a line of work that was initiated shortly after secret sharing was introduced. Namely, the construction of ideal linear secret sharing schemes for access structures that are natural generalizations of the threshold ones and have interesting properties for the applications. Some of them have hierarchical properties, while other ones...
If an image can be converted into a point in plane or space, lots of image problems can be considered based on geometric and vector theory. In this paper, the “image to point” conversion via complex number basis is proposed. Combined with the existing threshold access structures scheme, it leads to proposal of using number based secret sharing schemes in color images sharing.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید