نتایج جستجو برای: publicly verifiable secret sharing

تعداد نتایج: 130246  

1996
Markus Stadler

A secret sharing scheme allows to share a secret among several participants such that only certain groups of them can recover it. Veriiable secret sharing has been proposed to achieve security against cheating participants. Its rst realization had the special property that everybody, not only the participants, can verify that the shares are correctly distributed. We will call such schemes publi...

Journal: :CoRR 2002
Kamil Kulesza Zbigniew Kotulski

In the paper we apply graph vertex coloring for verification of secret shares. We start from showing how to convert any graph into the number and vice versa. Next, theoretical result concerning properties of n-colorable graphs is stated and proven. From this result we derive graph coloring check-digit scheme. Feasibility of proposed scheme increases with the size of the number, which digits are...

2017
Sébastien Gambs Marc-Olivier Killijian Cédric Lauradoux Cristina Onete Matthieu Roy Moussa Traoré

Terrorist fraud is a class of relay attacks against distancebounding (DB) protocols in which a distant malicious prover colludes with an attacker located in a verifier’s proximity when authenticating. Existing DB protocols resisting such attacks are designed to be lightweight and thus symmetric, relying on a secret shared by the prover and the verifier. Recently, several asymmetric distance-bou...

Journal: :IJDST 2014
Sankita Patel Mitali Sonar Devesh C. Jinwala

In this article, the authors propose an approach for privacy preserving distributed clustering that assumes malicious model. In the literature, there do exist, numerous approaches that assume a semi honest model. However, such an assumption is, at best, reasonable in experimentations; rarely true in real world. Hence, it is essential to investigate approaches for privacy preservation using a ma...

2017
Manoj Kumar

Verifiable secret sharing schemes are important in cloud computing environments. Thus a key can be distributed over many servers by threshold secret sharing mechanism. The key is then reconstructed when needed. Secret sharing has also been suggested for sensor networks where the links are liable to be tapped by sending the data in shares which makes the task of the eavesdropper harder. The secu...

Journal: :International Journal of Computational Intelligence Systems 2012

Journal: :IACR Cryptology ePrint Archive 2011
Michael Backes Aniket Kate Arpita Patra

Verifiable secret sharing (VSS) is an important primitive in distributed cryptography that allows a dealer to share a secret among n parties in the presence of an adversary controlling at most t of them. In the computational setting, the feasibility of VSS schemes based on commitments was established over two decades ago. Interestingly, all known computational VSS schemes rely on the homomorphi...

1996
Markus Stadler

A secret sharing scheme allows to share a secret among several participants such that only certain groups of them can recover it. Veri able secret sharing has been proposed to achieve security against cheating participants. Its rst realization had the special property that everybody, not only the participants, can verify that the shares are correctly distributed. We will call such schemes publi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید