نتایج جستجو برای: threshold secret sharing

تعداد نتایج: 220972  

Journal: :Comput. Sci. Inf. Syst. 2013
Zhenhua Tan Guangming Yang Wei Cheng Xingwei Wang

Threshold secret sharing schemes are ideal to protect confidential information. In this paper, we propose a novel distributed threshold secret sharing scheme based on spherical coordinates. As four non-coplanar points can determine a unique sphere, we design transformation algorithms to generate secret as sphere center and mapping algorithms to convert participants to be sphere surface p...

2016
Andrej Bogdanov Siyao Guo Ilan Komargodski

We prove that for every n and 1 < t < n any t-out-of-n threshold secret sharing scheme for one-bit secrets requires share size log(t + 1). Our bound is tight when t = n− 1 and n is a prime power. In 1990 Kilian and Nisan proved the incomparable bound log(n − t + 2). Taken together, the two bounds imply that the share size of Shamir’s secret sharing scheme (Comm. ACM ’79) is optimal up to an add...

A. Cheraghi

In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...

Journal: :CoRR 2012
Keyur Parmar Devesh C. Jinwala

Threshold secret sharing schemes do not prevent any malicious behavior of the dealer or shareholders and so we need verifiable secret sharing, to detect and identify the cheaters, to achieve fair reconstruction of a secret. The problem of verifiable secret sharing is to verify the shares distributed by the dealer. A novel approach for verifiable secret sharing is presented in this paper where b...

2009
Borna Jafarpour Azadeh Nematzadeh Vahid Kazempour Babak Sadeghian

Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants’ collusion. We propose a cheating model for the secret sharing schemes based on linear memor...

Journal: :JDIM 2012
Yi-Hui Chen Chin-Chen Chang

Recently, verifiable secret sharing schemes have been proposed to keep participants from providing fake or illegal stego-images. However, the schemes do not consider the recovery mechanism when parts of the information in stego-images are lost or incidentally modified during the transmission process. This paper presents a novel verifiable and reversible secret sharing scheme based on Shamir’s s...

2015
Tomoko Adachi

A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. Dealer distribute shares of a secret value among n participants. Gathering t(≤ n) participants, a secret value can be reconstructed. This is called a (t, n) secret sharing scheme. This scheme is based on Lagrange’s interpolation formula. As regard interpolation formula, it is known not only Lag...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید