نتایج جستجو برای: threshold secret sharing
تعداد نتایج: 220972 فیلتر نتایج به سال:
Threshold secret sharing schemes are ideal to protect confidential information. In this paper, we propose a novel distributed threshold secret sharing scheme based on spherical coordinates. As four non-coplanar points can determine a unique sphere, we design transformation algorithms to generate secret as sphere center and mapping algorithms to convert participants to be sphere surface p...
We prove that for every n and 1 < t < n any t-out-of-n threshold secret sharing scheme for one-bit secrets requires share size log(t + 1). Our bound is tight when t = n− 1 and n is a prime power. In 1990 Kilian and Nisan proved the incomparable bound log(n − t + 2). Taken together, the two bounds imply that the share size of Shamir’s secret sharing scheme (Comm. ACM ’79) is optimal up to an add...
In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...
Threshold secret sharing schemes do not prevent any malicious behavior of the dealer or shareholders and so we need verifiable secret sharing, to detect and identify the cheaters, to achieve fair reconstruction of a secret. The problem of verifiable secret sharing is to verify the shares distributed by the dealer. A novel approach for verifiable secret sharing is presented in this paper where b...
Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants’ collusion. We propose a cheating model for the secret sharing schemes based on linear memor...
Recently, verifiable secret sharing schemes have been proposed to keep participants from providing fake or illegal stego-images. However, the schemes do not consider the recovery mechanism when parts of the information in stego-images are lost or incidentally modified during the transmission process. This paper presents a novel verifiable and reversible secret sharing scheme based on Shamir’s s...
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. Dealer distribute shares of a secret value among n participants. Gathering t(≤ n) participants, a secret value can be reconstructed. This is called a (t, n) secret sharing scheme. This scheme is based on Lagrange’s interpolation formula. As regard interpolation formula, it is known not only Lag...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید