نتایج جستجو برای: threshold secret sharing

تعداد نتایج: 220972  

Journal: :IACR Cryptology ePrint Archive 2014
Ruxandra F. Olimid

Secret sharing allows a dealer to distribute a secret among multiple parties such that authorized coalitions can reconstruct the secret. Traditionally, the dealer knows the exact share each user holds. Grigoriev and Shpilrain recently considered secret sharing systems for which the dealer does not know the share of a particular party and introduced a construction for the special case of all-or-...

2017
Manoj Kumar

Verifiable secret sharing schemes are important in cloud computing environments. Thus a key can be distributed over many servers by threshold secret sharing mechanism. The key is then reconstructed when needed. Secret sharing has also been suggested for sensor networks where the links are liable to be tapped by sending the data in shares which makes the task of the eavesdropper harder. The secu...

Journal: :IACR Cryptology ePrint Archive 2003
Edgar Martínez-Moro Jorge Mozo-Fernández Carlos Munuera

In this paper we introduce the class of composite access structures for secret sharing. We also provide secret sharing schemes realizing these structures and study their information rates. As a particular case of this construction, we present the subclass of iterated threshold schemes, a large class of ideal secret sharing schemes.

2007
Hung-Yu Chien

Secret sharing schemes as basic building blocks for many applications in distributed systems should be efficient and robust to any possible attacks. Based on bilinear pairing, this paper will propose a new (t, n) threshold verifiable multi-secret sharing scheme and a GGOC verifiable multi-secret sharing scheme that improve the security and minimizes the number of published values.

2009
Ilker Nadi Bozkurt Kamer Kaya Ali Aydin Selçuk

Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating parties using a secret sharing scheme (SSS). Several function sharing schemes have been proposed in the literature, with most of them using Shamir secret sharing as the unde...

Journal: :CoRR 2015
V. P. Binu A. Sreekumar

Secret sharing is a new alternative for outsourcing data in a secure way. It avoids the need for time consuming encryption decryption process and also the complexity involved in key management. The data must also be protected from untrusted cloud service providers. Secret sharing based solution provides secure information dispersal by making shares of the original data and distributes them amon...

2009
Kamer Kaya Cevdet Aykanat Cengiz Çelik Mehmet B. Baray

THRESHOLD CRYPTOGRAPHY WITH CHINESE REMAINDER THEOREM Kamer Kaya Ph.D. in Computer Engineering Supervisor: Asst. Prof. Dr. Ali Aydın Selçuk August, 2009 Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements of the area. However, no ...

1999
Richard Cleve Daniel Gottesman Hoi-Kwong Lo

quantum information, secret sharing, quantum cryptography, quantum computation We investigate the concept of quantum secret sharing, where a secret quantum state is distributed between n parties in such a way that certain subsets of the parties can jointly recover the secret, while other subsets of the parties can acquire absolutely no information about it. In a ((k,n)) threshold scheme, any su...

2012
Vaibhav Kumar R. P. Ojha

This research paper introduces a scheme to secure any secret value in cloud network by Mobile Proactive Secret Sharing (MPSS). This is an extension of proactive secret sharing, where contributing parties of a network hold the shares of a secret value. Mobile proactive secret sharing is much more flexible than proactive secret sharing in terms of group membership: instead of the group of shareho...

2011
Nishant Doshi Devesh Jinwala

Threshold secret sharing schemes are used to divide a given secret by a dealer in parts such that no less than the threshold number of shareholders can reconstruct the secret. However, these schemes are susceptible to the malicious behavior of a shareholder or a dealer. To prevent such attacks, it is necessary to make a provision for verification of the integrity of the shares distributed by th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید