نتایج جستجو برای: secret sharing

تعداد نتایج: 100605  

Journal: :JSW 2013
He Du Jian Wang

in a proxy multi-signature, the proxy signer can sign a message on behalf of more than one original signer. However, in some cases, the proxy or the original signers do not want to leak the proxy signer's identity. In addition, when something is wrong with the signed message, the identity of the proxy signer has to be revealed. So the problem of anonymous but accountable has been proposed. Usin...

Journal: :I. J. Network Security 2006
Josef Pieprzyk Xian-Mo Zhang

The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restriction of regular mappings to permutations gives a convenient tool for investigation of the relation between permutations and ideal secret sharing generated by them.

Journal: :IACR Cryptology ePrint Archive 2003
Edgar Martínez-Moro Jorge Mozo-Fernández Carlos Munuera

In this paper we introduce the class of composite access structures for secret sharing. We also provide secret sharing schemes realizing these structures and study their information rates. As a particular case of this construction, we present the subclass of iterated threshold schemes, a large class of ideal secret sharing schemes.

2016
Ignacio Cascudo

Ignacio Cascudo Secret sharing schemes with algebraic properties and...

1996
Ghulam Rasool Chaudhry Jennifer Seberry

In this paper, we describe secret sharing schemes. We discuss Room squares and their critical sets. We propose a model of secret sharing based on critical sets of Room squares.

Journal: :Computers and Artificial Intelligence 2005
Iuon-Chang Lin Chin-Chen Chang

In this paper, we propose a new (t, n) threshold scheme. The scheme allows a user to divide portions of a secret among the designated group. Any t or more participants from a designated group of n members can cooperate to reconstruct the secret while (t−1) or less participants can not. Furthermore, the scheme provides an efficient mechanism to detect and identify cheaters. From the security ana...

Journal: :Des. Codes Cryptography 1997
Carlo Blundo Alfredo De Santis Roberto De Simone Ugo Vaccaro

A secret sharing scheme is a protocol by means of which a dealer distributes a secret s among a set of participants P in such a way that only qualiied subsets of P can reconstruct the value of s whereas any other subset of P; non-qualiied to know s; cannot determine anything about the value of the secret. In this paper we provide a general technique to prove upper bounds on the information rate...

2002
Josef Pieprzyk Xian-Mo Zhang

Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention ...

1992
Bob Blakley G. R. Blakley Agnes Hui Chan James L. Massey

When a shadow of a threshold scheme is publicized, new shadows have to be reconstructed and redistributed in order to maintain the same level of security. In this paper we consider threshold schemes with disenrollment capabilities where the new shadows can be created by broadcasts through a public channel. We establish a lower bound on the size of each shadow in a scheme that allows L disenroll...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید