نتایج جستجو برای: multi stage secret sharing scheme

تعداد نتایج: 1080245  

2001
Chun-Shan Liu Yung-Cheng Lee Chi-Sung Laih

The generalized secret sharing scheme is a method used to divide secret into a set of participants such that only the qualified subsets of participants can reconstruct the secret. In this paper, we first propose a new generalized secret sharing scheme with cheater detection. The security of the scheme is based on discrete logarithm problem. Based on this scheme, we present a group-oriented gene...

Journal: :CoRR 2009
Chi Sing Chum Xiaowen Zhang

This paper first reviews some basic properties of cryptographic hash function, secret sharing scheme, and Latin square. Then we discuss why Latin square or its critical set is a good choice for secret representation and its relationship with secret sharing scheme. Further we enumerate the limitations of Latin square in a secret sharing scheme. Finally we propose how to apply cryptographic hash ...

Journal: :CoRR 2014
Partha Sarathi Roy Avishek Adhikari

The main aim of this paper is to construct a multi-secret sharing scheme for general access structure in a trusted dealer model using suitable hash function and Lagrange’s interpolation method. Even though, the proposed scheme is a multi-secret and multi-use one, each participant has to carry only one share. The suitable use of collision resistant one way hash function makes the scheme efficien...

2013
Guilhem Castagnos Soline Renner Gilles Zémor

To guarantee that some implementation of a cryptographic scheme is secure against side channel analysis, one needs to formally prove its leakage resilience. A relatively recent trend is to apply methods pertaining to the field of Multi-Party Computation: in particular this means applying secret sharing techniques to design masking countermeasures. It is known besides that there is a strong conn...

Journal: :IEICE Transactions 2005
Kouya Tochikubo

We propose efficient secret sharing schemes realizing general access structures. Our proposed schemes are perfect secret sharing schemes and include Shamir’s (k, n)-threshold schemes as a special case. Furthermore, we show that a verifiable secret sharing scheme for general access structures is realized by one of the proposed schemes. key words: (k, n)-threshold scheme, general access structure...

Journal: :Applied Mathematics & Information Sciences 2014

1999
Ryo ITO Hidenori KUWAKADO

In the visual secret sharing scheme proposed by Naor and Shamir [3], a secret image is encoded into shares, of which size is larger than that of the secret image and the shares are decoded by stacking them without performing any cryptographic computation. In this paper we propose a (k, n) visual secret sharing scheme to encode a black-and-white image into the same size shares as the secret imag...

2013
Md Kausar Alam Sharmila Banu

Now a day’s rapidly increased use of cloud computing in the many organization and IT industries and provides new software with low cost [1]. So the cloud computing give us lot of benefits with low cost and of data accessibility through Internet. The ensuring security risks of the cloud computing is the main factor in the cloud computing environment, for example sensitive information with cloud ...

Journal: :International Journal of Theoretical Physics 2014

Journal: :J. Inf. Sec. Appl. 2015
Lein Harn Changlu Lin Yong Li

In Shamir’s (t, n) threshold secret sharing scheme, one secret s is divided into n shares by a dealer and all shares are shared among n shareholders, such that knowing t or more than t shares can reconstruct this secret; but knowing fewer than t shares cannot reveal any information about the secret s. The secret reconstruction phase in Shamir’s (t, n) threshold secret sharing is very simple and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید