نتایج جستجو برای: sealed secret

تعداد نتایج: 22719  

Journal: : 2022

Based on the analysis of Law Ukraine «On Intelligence» in general and its legal requirements for new category «intelligence secret» particular through controversy with scientists who have already expressed their views previous publications, authors once again drew attention scientific community to this crucial categories outlined approaches clarify content, direction completeness. The author’s ...

2006
Justie Su-tzu Juan Yu-Lin Chuang

Secret sharing schemes are methods for distributing a secret among n participants in such a way that any qualified subsets of participants can recover the secret, and unqualified participants can not. In 1979, secret sharing schemes were first independently introduced by Blakley and Shamir. In 1987, Feldman proposed a verifiable secret sharing scheme based on Shamir’s Scheme, that every partici...

2011
Kun Peng

VSS (verifiable secret sharing) is an important security protection tool in distributed systems. When VSS is employed in publicly verifiable applications, it needs to achieve public verifiability and be upgraded to PVSS (publicly verifiable secret sharing). Besides the two basic security properties, bindingness and hidingness, PVSS concentrates on public verifiability of validity all the operat...

2012
Assia Ben Shil Kaouther Blibech Sinaoui Riadh Robbana Wafa Neji

A Publicly Verifiable Secret Sharing (PVSS) scheme allows anyone to verify the validity of the shares computed and distributed by a dealer. The idea of PVSS was introduced by Stadler in [18] where he presented a PVSS scheme based on Discrete Logarithm. Later, several PVSS schemes were proposed. In [2], Behnad and Eghlidos present an interesting PVSS scheme with explicit membership and disputati...

1998
Kazuo Takaragi Kunihiko Miyazaki Masashi Takahashi

This paper describes an efficient (k, n) threshold digital signature scheme. In the scheme, k out of n signers cooperate to issue a signature without using trusted center. No secret communication is required among signers across the network. As a base scheme, Pedersen's verifiable secret sharing (VSS) is applied to generate shared secret keys in such a way that no secret communication is requir...

Journal: :Des. Codes Cryptography 2014
Mahabir Prasad Jhanwar Ayineedi Venkateswarlu Reihaneh Safavi-Naini

A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing (VSS) scheme in which anyone, not only the shareholders, can verify that the secret shares are correctly distributed. PVSS plays an essential role in the systems that use VSS. In this paper we present a new construction for PVSS scheme based on Paillier encryption scheme.We formalize the notion of indistinguishabi...

2003
Kun Peng Colin Boyd Ed Dawson Kapali Viswanathan

Published sealed-bid auction schemes are classi ed into four models according to how they deal with bid privacy. The properties of each model are introduced and possible improvements in these models are suggested. A new model is proposed and its implementation is discussed. Application of di erent models is discussed, based on a comparison of the models.

Journal: :The Journal of aviation medicine 1959
D G SIMONS

W H E N the Manhigh capsule system was being designed in the fall of 1955, the pr imary objective was a maximum performance system of minimum weight that could lift a man into a space equivalent environment for twenty-four hours. This objective 'had to be met safely and supply an answer to what the man could :do if any specific componem failed. Beyond this, an effort was made to provide him wit...

2017

We have N = {1, . . . , n} bidders, where each bidder has a private valuation vi drawn from distribution Fi 1 with strictly positive den1 Here, we assume that valuations follow the IPV model. sity, fi : Ti → R>0, for a good up for sale by the auctioneer, agent 0. In a first-price, sealed-bid auction, each agent has a type vi ∈ Ti, and submits a bid bi to the auctioneer, without revealing what t...

Journal: :CoRR 2013
Andrew Lutomirski

Consider a protocol in which Belinda seals a (classical) message. She gives the resulting sealed message to Charlie, who can either unseal and read the message or return it unopened to Belinda. If he returns it unopened, Belinda should be able to verify that Charlie neither read the message nor made a copy that would allow him to read it later. Such a protocol is impossible with classical crypt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید