نتایج جستجو برای: publicly verifiable secret sharing

تعداد نتایج: 130246  

Journal: :IACR Cryptology ePrint Archive 2016
Michel Abdalla Mario Cornejo Anca Nitulescu David Pointcheval

Password-protected secret sharing (PPSS) schemes allow a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. In particular, this secret will remain safe as long as not too many servers get corrupted. However, servers are not always reliable and ...

Journal: :CoRR 2005
Hao Chen

It is well-known that the linear secret-sharing scheme (LSSS) can be constructed from linear error-correcting codes (Brickell [1], R.J. McEliece and D.V.Sarwate [2],Cramer, el.,[3]). The theory of linear codes from algebraic-geometric curves (algebraic-geometric (AG) codes or geometric Goppa code) has been well-developed since the work of V.Goppa and Tsfasman, Vladut, and Zink( see [17], [18] a...

2012
Ranjit Kumaresan

Title of dissertation: BROADCAST AND VERIFIABLE SECRET SHARING: NEW SECURITY MODELS AND ROUND-OPTIMAL CONSTRUCTIONS Ranjit Kumaresan, Doctor of Philosophy, 2012 Dissertation directed by: Professor Jonathan Katz Department of Computer Science Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party computation. These protocols are required to be resilient ...

2011
Chun-Yu Chen Jyun-Jie Wang Chi-Yuan Lin Chuin-Mu Wang

A novel verifiable secret sharing method for Verifiable secret sharing (VSS) in halftone image based on linear block code with a parity check matrix is proposed. The proposed method, which not only verifies a secret image but also introduces multiple shadows for multiple users. The proposed method adopts forward error correction code (FEC) strategy based on property of linear block codes. There...

Journal: :International Journal of Advanced Computer Science and Applications 2022

Verifiable Secret Sharing (VSS) is a fundamental tool of cryptography and distributed computing in Internet Things. Since network bandwidth scarce resource, minimizing the number verification data will improve performance VSS. Existing VSS schemes, however, face limitations meeting energy consumptions for low-end devices, which make their adoption challenging resource-limited IoTs. To address a...

2007
Christophe Tartary Josef Pieprzyk Huaxiong Wang

A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition, some secrets may require a higher security level than others involving t...

Journal: :International Journal of Information Technology and Computer Science 2014

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2014

Journal: :IJCAC 2012
P. Syam Kumar Marie Stanislas Ashok R. Subramanian

Data storage is an important application of cloud computing, where the users can remotely store their data into the cloud. This new paradigm of data storage service also introduces security challenges, such as Confidentiality, Integrity and Availability of data. The protection of these issues in cloud is a very challenging and potentially formidable task, especially for the users with constrain...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید