نتایج جستجو برای: remainder

تعداد نتایج: 15349  

Journal: :Proceedings of the American Mathematical Society 2008

Journal: :IACR Cryptology ePrint Archive 2006
Sorin Iftene

In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem in order to deal with more general access structures. Aspects like verifiability, secret sharing homomorphisms and multiplicative properties are also discussed. AMS Subject Classification: 94A62, 11A07

Journal: :MATHEMATICA SCANDINAVICA 1965

Journal: :The American Law Register (1898-1907) 1902

Journal: :Journal of the Mathematical Society of Japan 2015

Journal: :Arkiv för Matematik 1954

Journal: :Security and Communication Networks 2013
Niu Liu Shaohua Tang Lingling Xu

The hierarchical access control scheme based on Chinese Reminder Theorem [49] (CRTHACS) was supposed to be capable of hiding hierarchical structure, but Geiselmann et al. [18] showed practical attacks on CRTHACS to reveal the hierarchies it hides. Then, Zou et al. modified it, and gave a new CRTHACS [50] to resist those attacks. Nevertheless, we find that the modified version is still defective...

Journal: :CoRR 2017
Hanshen Xiao Yufeng Huang Yu Ye Guoqiang Xiao

Chinese Remainder Theorem (CRT) has been widely studied with its applications in frequency estimation, phase unwrapping, coding theory and distributed data storage. Since traditional CRT is greatly sensitive to the errors in residues due to noises, the problem of robustly reconstructing integers via the erroneous residues has been intensively studied in the literature. In order to robustly reco...

Journal: :Journal of the Australian Mathematical Society. Series A. Pure Mathematics and Statistics 1986

Journal: :Publications of the Research Institute for Mathematical Sciences 1984

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید