نتایج جستجو برای: probabilistic key sharing

تعداد نتایج: 694661  

Journal: :I. J. Network Security 2016
Qiao Peng Youliang Tian

Using multiple linear of multilinear map, we propose a simple, non-interactive and effective publicly verifiable secret sharing (PVSS) scheme based on multilinear DiffieHellman assumption (MDH). Up to now, the publicly verifiable of secret sharing is still an issue. In this paper, we set the sharing secret is a multiple linear pairing, we apply the multiple linear property of multilinear map fo...

Suresh Kumar

This paper presents an analytical model based on mean value analysis (MVA) technique for a probabilistic re-entrant line. The objective is to develop a solution method to determine the total cycle time of a Reflow Screening (RS) operation in a semiconductor assembly plant. The uniqueness of this operation is that it has to be borrowed from another department in order to perform the production s...

ژورنال: پژوهش های تربیتی 2014
Alipour Darvish, Zahra, Mirasadollah Lajrod, Leila,

One of the most important resources for any organization, competitiveness and innovation, knowledge management and knowledge sharing in the organization and the process is correct. Despite the importance knowledge sharing, manpower agencies may refrain from doing it. That's why one of the key challenges in knowledge management is how organizations can encourage employees to share their knowledg...

Journal: :Computers & Electrical Engineering 2014
Lein Harn Changlu Lin

In a group Diffie–Hellman (GDH) key agreement protocol, all group members collaboratively establish a group key. Most GDH key agreement protocols took natural generalization of the original Diffie–Hellman (DH) key agreement protocol to arrange all group members in a logic ring or a binary tree and to exchange DH public keys. The computational cost and the communication rounds are the two most i...

2016
Pratima Popat Gutal

Distributed key generation cryptosystems has a major content called distributed key generation (DKG) protocol. This protocol allows number of participants of group to generate a set of keys such as private key and public key without determining some trusted participants. Only authorized subgroups of participants are capable to regenerate or implement the private key and the public key is an out...

2008
Fagen Li Masaaki Shirase Tsuyoshi Takagi

As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management approach by using the recently developed concepts of certificateless public key cryptography and threshold secret sharing schemes. Without any assumption of prefixed trust relat...

2016
Anja I. S. Moldenhauer

The topic of this thesis is established in the area of mathematical cryptology, more preciselyin group based cryptology. We give extensions of cryptographic protocols, develop new crypto-graphic protocols concerning the mathematical background and give modifications of them. Inaddition cryptographic analysis as well as examples are given. The focus lays on the developmentof new ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید