نتایج جستجو برای: sealed secret
تعداد نتایج: 22719 فیلتر نتایج به سال:
In electronic auction applications, small-value merchandise is often distributed. We call this kind of auction micro auction. Compared to traditional general-purpose electronic auction, micro electronic auction has its own special requirements. Especially, micro auction must be very efficient: the cost of the auction protocol must not be over the cost of the merchandise for sale. Although the m...
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
A sealed atmosphere in a mined-out area of an underground coal mine is simply a volume with homogeneous composition governed by boundary conditions. This paper presents a mathematical model based upon the conservation of mass principle that describes the flow of air (nitrogen and oxygen), methane and carbon dioxide into and out of a sealed atmosphere and the time-dependent changes in gas concen...
We show that if a set of players hold shares of a value a ∈ Zp for some prime p (where the set of shares is written [a]p), it is possible to compute, in constant round and with unconditional security, sharings of the bits of a, i.e. compute sharings [a0]p, . . . , [a`−1]p such that ` = dlog 2 (p)e, a0, . . . , a`−1 ∈ {0, 1} and a = ∑`−1 i=0 ai2 . Our protocol is secure against active adversarie...
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
Hermetic storage is used to protect grain against insect pests, but its utility is not limited to whole grains. We evaluated hermetically-sealed, polyethylene terephthalate (PET) bottles for preserving wheat and maize flour against red flour beetle (RFB, Tribolium castaneum, Herbst) population growth. Flours infested with RFB and kept in sealed PET bottles experienced much less weight loss over...
2-level shared secret schemes are defined by Simmons in 1989. In this paper, we describe a survey of 2-level secret sharing schemes using finite geometry.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید