نتایج جستجو برای: secret key

تعداد نتایج: 564100  

Journal: :IEEE Transactions on Information Theory 2016

Journal: :IEEE Transactions on Information Theory 2012

Journal: :International Journal of Computer Science & Engineering Survey 2011

Journal: :IEEE Transactions on Information Forensics and Security 2020

2008
Shyong Jian Shyu Ying-Ru Chen

In traditional secret sharing schemes for general access structures, a secret can be encoded into n sets of (shadow, key)’s which are distributed to n participants one by one. Only those participants belonging to a pre-defined qualified subset can recover the shared secret by using their (shadow, key)’s. The size of (shadow, key)’s may be different for different participants. This problem exist...

Journal: :JNW 2011
Yongquan Cai Huili Shi

Considering the case of players’ deceptions, traditional secret sharing scheme can not resolve the security issues. To address these security issues, the paper proposes a rational secret sharing scheme against cheating based on game theory. Under the conditions of the rational, applying the idea of threshold, the scheme is composed of key generation, share encryption, verification and secret re...

2015
Dong WANG Juan HUANG Yajun LI Guoxiang SONG

Recently, some group key transfer protocols are proposed using Shamir’s secret sharing, which are claimed to be secure to resist the insider attack and the outsider attack. In fact, some claims are not really true. In this paper, we review the recently proposed protocol by Yuan et al. and the cryptanalysis presented by Olimid, then give the improved version to guarantee the security and low com...

Journal: :IEEE Transactions on Information Theory 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید