نتایج جستجو برای: sharing

تعداد نتایج: 87406  

Journal: :IACR Cryptology ePrint Archive 2003
Kamil Kulesza Zbigniew Kotulski Josef Pieprzyk

The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. The participants interact (no third party involved) in order to check validity of their shares before they are pooled for secret recovery. Verification efficiency does not depend on the number of faulty participants.

Journal: :IACR Cryptology ePrint Archive 2010
Kamer Kaya Ali Aydin Selçuk

In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed earlier are not secure from an attack where the dealer is able to distribute inconsistent shares to the users. Then we propose a new VSS scheme based on the CRT and prove its security. Using the proposed VSS scheme, we develop...

Journal: :Computer Communications 2008
Massoud Hadian Dehkordi Samaneh Mashhadi

Inthispaper,wepropose twosecureverifiablemulti-secret sharingschemes thatarebasedonnon-homogeneous linearrecursionsandelliptic curvesoverZN .Suchschemeshavesimpleconstructionandverificationphases.Moreover thesehavevarious techniques for the reconstruction phase. The security of the proposed schemes is based on the security of the ECRSA cryptosystem and the intractability of the ECDLP. 2007 Else...

2003
D. Hausheer N. Liebau A. Mauthe R. Steinmetz B. Stiller David Hausheer Nicolas C. Liebau Andreas Mauthe Ralf Steinmetz Burkhard Stiller

This paper presents a token-based accounting mechanism that alleviates the free riding problem in P2P networks. On the basis of a P2P file sharing scenario it is shown how tokens are issued, certified and used as a payment in a secure and scalable way. The approach is complemented by distributed pricing as a flexible and viable scheme to incite users to share valuable content and to efficiently...

1995
Rosario Gennaro Silvio Micali

We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself.

2006
Hongding Wang Shaohua Tan Shiwei Tang Dongqing Yang Yunhai Tong

Sharing files discovery is a fundamental problem in P2P networking. This paper presents a name-based approach for identifying sharing file correspondences in multilingual P2P systems. The problem is first analyzed through comparing the names of the sharing files in different nodes of a real P2P community, which name those files in different languages. Then based on the relationships of those fi...

2006
Dongmei Jia Wai Gen Yee Ophir Frieder

Peer-to-peer file-sharing systems have poor search performance for rare or poorly described files. These files lack a quality or variety of metadata making them hard to match with queries. A server can alleviate this problem by gathering the descriptors used by peers via what we call probe queries, and use these descriptors to improve its own. We consider probe query triggering mechanisms and c...

2003
David Hausheer Nicolas Liebau Andreas Mauthe Ralf Steinmetz Burkhard Stiller

This paper presents a token-based accounting mechanism that alleviates the free riding problem in P2P networks. The approach is complemented by distributed pricing as a flexible and viable scheme to incite users to share valuable content and to efficiently balance requests among all peers based on economic decisions.

2001
Chun-Shan Liu Yung-Cheng Lee Chi-Sung Laih

The generalized secret sharing scheme is a method used to divide secret into a set of participants such that only the qualified subsets of participants can reconstruct the secret. In this paper, we first propose a new generalized secret sharing scheme with cheater detection. The security of the scheme is based on discrete logarithm problem. Based on this scheme, we present a group-oriented gene...

Journal: :Theoretical Computer Science 2003

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید