• No results found

Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography

N/A
N/A
Protected

Academic year: 2020

Share "Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 2. Scheme 1—Proposed (t, n) SS.
Figure 3. Scheme scheme.2—Proposed (t, n) threshold decryption

References

Related documents

OL bLogccpu gpc wx-gjcc vTu2 vuq joaac (q) go jcqcp ong po v gi.vuipou umpg vccg rngcLc2g vgv vuq vcg bucc2 poi bucc JCACj cpvuc2 gpvg um? oi wv) uog vccowbsuX v gwu2ipou vgjccg

Furthermore, the technology used for developing computer simulated integrated flowsheet models needs to be continued to be advanced and taught in chemical engineering,

Results: Both ROM and NZ, unilateral cage-instrumented PLIF and bilateral cage-instrumented PLIF, transpedicle screw insertion procedure did not revealed a significant

health system factors such as the female community health volunteers and nurses not allowing men`s involvement in MCH clinics, family planning and MCH services being run by female

En somme, nous pouvons ainsi avancer que ce sont les personnes les plus diplômées, exerçant une activité intellectuelle et habitant dans les quartiers riches qui présentent

In order to gain insights into the impact of interest rate and exchange rate policies on the development of real economic variables, we regressed the differentials of growth rates

These forward-looking statements include, without limitation, statements about the Company’s market opportunities, strategies, competition, expected activities and expenditures

The students can contact the school social worker or psychologist themselves or with the help of their parents, the school nurse, the form teacher, the subject teacher, the