Secure Communication with Secret Sharing for the S-Network Using a Large Set of Mistrust-Parties

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure communication with secret sharing for the S-Network using a large set of mistrust-parties

This article presents a solution to ensure secure communication in computer networks by using secret sharing and multiple parties mistrusting each other instead of relying on a “trusted party” or a “web of trust”. In contrast to other solutions requiring asymmetric encryption, this concept can provide security even after any possible advance in cryptanalysis and even if unlimited calculation po...

متن کامل

Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol

This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security and eliminate the dependency on single trusted third party. This protocol for communication between a device and two trusted third parties uses the piggy bank cryptographic paradigm. We also present a protocol to give law enforcing agencies access to sensitive information present on...

متن کامل

Secure Network Coding via Filtered Secret Sharing∗

We study the problem of using a multicast network code to transmit information securely in the presence of a “wire-tap” adversary who can eavesdrop on a bounded number of network edges. We establish a close connection between secure linear network coding and a new variant of the secret sharing problem, which we call filtered secret sharing. Using this connection, we establish new trade-offs bet...

متن کامل

assessment of the efficiency of s.p.g.c refineries using network dea

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

Multiparty quantum secret sharing of secure direct communication

Based on the two-step protocol [Phys. Rev. A68(03)042317], we propose a (n, n)-threshold multiparty quantum secret sharing protocol of secure direct communication. In our protocol only all the sharers collaborate can the sender’s secure direct communication message be extracted. We show a variant version of this protocol based on the variant two-step protocol. This variant version can considera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Networks

سال: 2013

ISSN: 2326-9766

DOI: 10.11648/j.net.20130102.11