نتایج جستجو برای: threshold secret sharing scheme

تعداد نتایج: 431523  

2006
Yuliang Zheng Thomas Hardjono Jennifer Seberry

A (t, w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret. This paper is concerned with the re-use of shares possessed by shareholders in threshold schemes. We propose a simple (t, w) threshold scheme based on the use of the pseudo-random function family and the unive...

Journal: :I. J. Network Security 2011
Hussein Al-Bahadili Shakir M. Hussain Ghassan Issa Khaled El-Zayyat

This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme can be used effectively in selfsecuring MANETs suffering from high packet-loss due to presence of noise and node mobility. In order to evaluate the performance of the TSS scheme in noisy MANETs, a number of simulations w...

Journal: :Comput. J. 1994
Yuliang Zheng Thomas Hardjono Jennifer Seberry

A t w threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret This paper is concerned with the re use of shares possessed by shareholders in threshold schemes We propose a simple t w threshold scheme based on the use of cryptographically strong pseudo random functions and un...

2010
Priyanka Koneru

In secret sharing scheme, the master secret and all the private shares (which are distributed by the dealer to the shareholders) are the two secrets which are to be maintained confidentially. In all the secret sharing schemes proposed till date, private shares are reused to reconstruct the master secret. But we proposed a new way of Proactive Secret Sharing Scheme in which, instead of renewing ...

Journal: :IEEE Transactions on Information Theory 2014

Journal: :IACR Cryptology ePrint Archive 2004
Chunming Tang Dingyi Pei Zhuojun Liu Yong He

A publicly verifiable secret sharing scheme is more applicable than a verifiable secret sharing because of the property that the validity of the shares distributed by the dealer can be verified by any party. In this paper, we construct a non-interactive and informationtheoretic publicly verifiable secret sharing by a computationally binding and unconditionally hiding commitment scheme and zero-...

1993
Carlo Blundo Alfredo De Santis Luisa Gargano Ugo Vaccaro

A secret sharing scheme permits a secret to be shared among participants in such a way that only qualiied subsets of participants can recover the secret, but any non-qualiied subset has absolutely no information on the secret. In this paper we consider the problem of designing eecient secret sharing schemes having the additional feature that qualiied minorities can forbid any other set of parti...

2011
Jordi Pujol Ahulló Roger Jardí-Cedó Jordi Castellà-Roca Oriol Farràs

The private key of electronic elections is a very critical piece of information that, with an incorrect or improper use, may disrupt the elections results. To enforce the privacy and security of the private key, secret sharing schemes (or threshold schemes) are used to generate a distributed key into several entities. In this fashion, a threshold of at least t out of the n entities will be nece...

Journal: :IEICE Transactions 2012
Jun Kurihara Tomohiko Uyematsu Ryutaroh Matsumoto

This paper precisely characterizes secret sharing schemes based on arbitrary linear codes by using the relative dimension/length profile (RDLP) and the relative generalized Hamming weight (RGHW). We first describe the equivocation Δm of the secret vector s = [s1, . . . ,sl ] given m shares in terms of the RDLP of linear codes. We also characterize two thresholds t1 and t2 in the secret sharing ...

Journal: :Signal Processing 2014
Chin-Chen Chang Ngoc-Tu Huynh Hai-Duong Le

This study proposes a novel multi-image threshold sharing scheme based on Chinese remainder theorem and Lagrange interpolation. The exceptional property of the scheme is its ability to retrieve any secret image without recovering all the other images. Therefore, it works efficiently and reduces computation cost in case it needs to recover only one image from shares. In term of capacity, the sch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید