نتایج جستجو برای: probabilistic key sharing
تعداد نتایج: 694661 فیلتر نتایج به سال:
Group key transfer protocols allow multiple parties to share a common secret key. They rely on a mutually trusted key generation center (KGC) that selects the key and securely distributes it to the authorized participants. Recently, Sun et al. proposed an authenticated group key transfer protocol based on secret sharing that they claim to be secure. We show that this is false: the protocol is s...
The Role of Personal, Organizational, and Technological Factors in Predicting Teachers’ Beliefs about Knowledge Sharing M. Bohlool R. Hosseyngholizaadeh, Ph.D. M. Karami, Ph.D. To explore the role of personal, organizational, and technological factors in predicting teachers’ beliefs about knowledge sharing, a sample of 173 Rashtkhaaree teachers was randomly sele...
The present paper aimed at developing an approach based on Fuzzy Inference System (FIS) for measuring of knowledge sharing in the organization. In recent years there has been increasing interest in the knowledge sharing by experts and managers in the world, according to increasing importance of knowledge as the key source of competitive advantage, organizations have made serious effort to find ...
A Key Distribution Center of a network is a server enabling private communications within groups of users. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we build a robust Distributed Key Distribution Center Scheme secure against active and mobile adversary. We consider a general access structure for the set of servers an...
We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis ...
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is concerned particularly with systems where users place their trust collectively with groups of trusted third parties. We consider two different protocols, discuss and improve their efficiency and generalise the type of key...
Abs t rac t . A publicly verifiable secret sharing (PVSS) scheme, named by Stadler in [Sta96], is a special VSS scheme in which anyone, not only the shareholders, can verify that the secret shares are correctly distributed. The property of public verifiability is what the first proposed VSS scheme [CGMA85] incorporated but later protocols [GMW87, Fe187, Ped911 failed to include. PVSS can provid...
In a (t, n) secret sharing scheme (SS), a dealer divides the secret into n shares in such way that any t or more than t shares can reconstruct the secret but fewer than t shares cannot reconstruct the secret. The multi-SS is an extension of the (t, n) SS in which shares can be reused to reconstruct multiple secrets. Thus, the efficiency of the multi-SS is better than the efficiency of the (t, n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید