نتایج جستجو برای: publicly verifiable secret sharing

تعداد نتایج: 130246  

Journal: :JNW 2013
Guoxiang Yao Saizhi Ye Caiting Huang

In this paper, a novel key management model and algorithm for two-tier architecture network are proposed based on elliptic curve cryptosystem (ECC) combined with public key (CPK) technology, verifiable secret sharing technology, and two-tier architecture network technology. This novel key management algorithm is composed of several sub-algorithms, such as key generation, key update, nodes joini...

2005
Qiong Li Xiamu Niu Zhifang Wang Yuhua Jiao Sheng-He Sun

By adopting a non-interactive information-theoretic secure verifiable secret sharing scheme in an unorthodox way, a verifiable fingerprint vault scheme is presented in this paper. Fuzzy vault scheme is a novel cryptographic construct which can increase the security of the biometric template in a biometric authentication system. It can be also used to bind the cryptographic key and the user in a...

2002
Serge Fehr Ueli Maurer

We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear verifiable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer. VSS and DC are main building blocks for unconditional secure multi-party computation protocols. Th...

2000
Ronald Cramer Ivan Damgård Ueli Maurer

We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) for the players, provided that the access structure of the LSSS allows MPC or VSS at all. Because an LSSS neither guarantees reconstructability when some shares are false, nor verifiability of a shared value, nor allow...

Journal: :Information & Computation 2022

Blockchains are commonly used for crypto-currency systems, where they publicly store transactions. In a permissioned blockchain, only few participants (nodes) can push new transactions to the chain. The known boundary on number of faulty – up f 3f+1 may be surpassed, causing underlying consensus algorithm (BFT) fail. When malicious adversary compromises or corrupts enough nodes it lead complete...

2017
Arup Kumar CHATTOPADHYAY Koushik MAJUMDER Abul Kalam Azad

The ( ) , t n threshold secret sharing scheme proposed by Shamir (1979) encodes the secret key into n shares and those shares are distributed among the participants. Each share incorporates an x-value uniquely designated for every single participant. If the shares are distributed on insecure (or public) channels, malicious users may acquire a few (or all) shares. If the number of shares obtaine...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید