نتایج جستجو برای: sealed secret

تعداد نتایج: 22719  

2006
Kun Peng Colin Boyd Ed Dawson

In electronic auction applications, small-value merchandise is often distributed. We call this kind of auction micro auction. Compared to traditional general-purpose electronic auction, micro electronic auction has its own special requirements. Especially, micro auction must be very efficient: the cost of the auction protocol must not be over the cost of the merchandise for sale. Although the m...

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

2010
R. K. Zipf K. M. Mohamed

A sealed atmosphere in a mined-out area of an underground coal mine is simply a volume with homogeneous composition governed by boundary conditions. This paper presents a mathematical model based upon the conservation of mass principle that describes the flow of air (nitrogen and oxygen), methane and carbon dioxide into and out of a sealed atmosphere and the time-dependent changes in gas concen...

Journal: :Microscopy and Microanalysis 2003

Journal: :IACR Cryptology ePrint Archive 2005
Ivan Damgård Matthias Fitzi Jesper Buus Nielsen Tomas Toft

We show that if a set of players hold shares of a value a ∈ Zp for some prime p (where the set of shares is written [a]p), it is possible to compute, in constant round and with unconditional security, sharings of the bits of a, i.e. compute sharings [a0]p, . . . , [a`−1]p such that ` = dlog 2 (p)e, a0, . . . , a`−1 ∈ {0, 1} and a = ∑`−1 i=0 ai2 . Our protocol is secure against active adversarie...

A. Cheraghi , M. Hadian Dehkordi ,

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

2017
Yan Yan Scott B Williams Larry L Murdock Dieudonne Baributsa

Hermetic storage is used to protect grain against insect pests, but its utility is not limited to whole grains. We evaluated hermetically-sealed, polyethylene terephthalate (PET) bottles for preserving wheat and maize flour against red flour beetle (RFB, Tribolium castaneum, Herbst) population growth. Flours infested with RFB and kept in sealed PET bottles experienced much less weight loss over...

2014
Tomoko Adachi

2-level shared secret schemes are defined by Simmons in 1989. In this paper, we describe a survey of 2-level secret sharing schemes using finite geometry.

Journal: :ACM Transactions on Architecture and Code Optimization 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید