نتایج جستجو برای: secret key
تعداد نتایج: 564100 فیلتر نتایج به سال:
In traditional secret sharing schemes for general access structures, a secret can be encoded into n sets of (shadow, key)’s which are distributed to n participants one by one. Only those participants belonging to a pre-defined qualified subset can recover the shared secret by using their (shadow, key)’s. The size of (shadow, key)’s may be different for different participants. This problem exist...
Considering the case of players’ deceptions, traditional secret sharing scheme can not resolve the security issues. To address these security issues, the paper proposes a rational secret sharing scheme against cheating based on game theory. Under the conditions of the rational, applying the idea of threshold, the scheme is composed of key generation, share encryption, verification and secret re...
Recently, some group key transfer protocols are proposed using Shamir’s secret sharing, which are claimed to be secure to resist the insider attack and the outsider attack. In fact, some claims are not really true. In this paper, we review the recently proposed protocol by Yuan et al. and the cryptanalysis presented by Olimid, then give the improved version to guarantee the security and low com...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید