[PDF] Top 20 Nearly Optimal Robust Secret Sharing
Has 10000 "Nearly Optimal Robust Secret Sharing" found on our website. Below are the top 20 most common "Nearly Optimal Robust Secret Sharing".
Nearly Optimal Robust Secret Sharing
... Monte-Carlo secret sharing scheme with small share length in the ramp model (where obtaining a sharp threshold; ...the secret s is encoded with an AMD code, and then the result x is mapped to a ... See full document
21
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
... Prior Constructions. On the positive side, several prior works show how to construct robust sharing schemes in the maximal corruption setting with n = 2t + 1 parties. The first such scheme was described in ... See full document
38
Non-Malleable Secret Sharing
... verifiable secret sharing, which allowed the adversary to tamper almost half the shares, and still ensured that the adversary cannot cause the reconstruction procedure to output an incorrect message (except ... See full document
45
An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency
... a secret sharing scheme, it is assumed that everyone involved with the protocol is hon- est or semi ...incorrect secret. This observation led to some interesting protocols viz. secret ... See full document
9
Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme
... single secret c to be store by a cloud storage provider S; (ii) Using secret c, each client may easily recovery their own original file respectively; (iii) If the server alters c in any way, no clients will ... See full document
9
Secret Sharing Scheme: Securing Data In Multi-Clouds Using Systmatic Secret Sharing Methods
... threshold shares to address insider attacks [4] [5]. An attacker cannot break the confidentiality of CloudStash un- less he compromises M cloud where M is secret sharing threshold M which may be up to the ... See full document
8
A Survey on Secure Distributed Deduplication Systems with Improved Reliability
... deterministic secret sharing scheme the Security analysis demonstrate that our scheme is secure in terms of the definitions specified in the proposed security ...usedeterministic secret ... See full document
5
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersive Routes
... WSN: secret sharing of information, randomized propagation of each information share, and normal routing ...MÞ-threshold secret sharing algorithm, ...the secret shares can be propagated ... See full document
7
A Study on Multisecret-Sharing Schemes Based on Linear Codes
... Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some participants and a ...a secret. The main principle is to distribute a secret ... See full document
9
On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate
... the secret s if and only if f(x, y) = ...the secret-sharing problem as the problem of realizing a CDS for the predicate f and vice-versa by setting the share of the x-th player ... See full document
28
Nearly optimal asset allocations in retirement
... the optimal asset allocation during retirement? This article provides a brief but simple message that conservative asset allocations in retirement are quite acceptable after ... See full document
10
A New Approach to Construct Secret Sharing Schemes Based on Field Extensions
... Abstract. Secret sharing has been a subject of study since ...a secret key, passwords, information of the map of a secret place or an important formula must be kept ...the secret into ... See full document
8
MULTI-LEVEL KEY DISTRIBUTION ALGORITHM FOR SECRET KEY RECOVERY SYSTEM
... the secret by user as well as support law enforcement for the ...importance secret key due to more chances of brute force or higher possibility for collusion as the Key Recovery Agents ...the secret ... See full document
11
Revisiting Secure Two-Party Computation with Rational Players
... The shares are signed by the dealer. Hence, no player can give out false shares undetected and the only possible action of a player in a round is to either 1) send the message or 2) remain silent. The round in which the ... See full document
13
On Cryptographic Anonimity and Unpredicatbility in Secret Sharing
... the secret can be recovered by anyone, otherwise it remain ...the sharing protocol in any way (step 1 is implemented by a pro- gram running on each computer and nobody tinkers with their ...the ... See full document
10
A Review on Visual Secret Sharing Schemes
... original secret can be printed directly on the share ...Next secret sharing method is applied to each color channel ...the secret is encoded at bit-level which improves image ...that ... See full document
5
Secret Sharing and Statistical Zero Knowledge
... Efficient Secret-Sharing Schemes. Consider secret sharing schemes that are defined not for a given access structure, but uniformly for some class of access ...The sharing algorithm in ... See full document
26
A Survey on Secret Sharing by Visual Cryptography
... [4] Strengthen the Security of Confidential Information utilizing Cryptographic Technique by Prasanna Kumar H.R and Dr. Niranjan N Chiplunkar, are utilized two strategies, in the main technique they encode the ... See full document
5
Leakage Resilient Secret Sharing and Applications
... Defining Leakage Tolerance. We extend the above definition of security to also account for possible leakage from the states of honest parties. Specifically, we define the notion of leakage tolerance for an MPC protocol ... See full document
42
KAD II. SECRET
... The digital world today has brought with it a great demand for information security products. The security aspects of these products are based extensively on the advancements in the science of Cryptology. The techniques ... See full document
6
Related subjects