• No results found

[PDF] Top 20 Nearly Optimal Robust Secret Sharing

Has 10000 "Nearly Optimal Robust Secret Sharing" found on our website. Below are the top 20 most common "Nearly Optimal Robust Secret Sharing".

Nearly  Optimal  Robust  Secret  Sharing

Nearly Optimal Robust Secret Sharing

... Monte-Carlo secret sharing scheme with small share length in the ramp model (where obtaining a sharp threshold; ...the secret s is encoded with an AMD code, and then the result x is mapped to a ... See full document

21

Essentially  Optimal  Robust  Secret  Sharing  with  Maximal  Corruptions

Essentially Optimal Robust Secret Sharing with Maximal Corruptions

... Prior Constructions. On the positive side, several prior works show how to construct robust sharing schemes in the maximal corruption setting with n = 2t + 1 parties. The first such scheme was described in ... See full document

38

Non-Malleable  Secret  Sharing

Non-Malleable Secret Sharing

... verifiable secret sharing, which allowed the adversary to tamper almost half the shares, and still ensured that the adversary cannot cause the reconstruction procedure to output an incorrect message (except ... See full document

45

An  Efficient $t$-Cheater  Identifiable  Secret  Sharing  Scheme  with  Optimal  Cheater  Resiliency

An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency

... a secret sharing scheme, it is assumed that everyone involved with the protocol is hon- est or semi ...incorrect secret. This observation led to some interesting protocols viz. secret ... See full document

9

Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme

Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme

... single secret c to be store by a cloud storage provider S; (ii) Using secret c, each client may easily recovery their own original file respectively; (iii) If the server alters c in any way, no clients will ... See full document

9

Secret Sharing Scheme: Securing Data In Multi-Clouds Using Systmatic  Secret Sharing Methods

Secret Sharing Scheme: Securing Data In Multi-Clouds Using Systmatic Secret Sharing Methods

... threshold shares to address insider attacks [4] [5]. An attacker cannot break the confidentiality of CloudStash un- less he compromises M cloud where M is secret sharing threshold M which may be up to the ... See full document

8

A Survey on Secure Distributed Deduplication Systems with Improved Reliability

A Survey on Secure Distributed Deduplication Systems with Improved Reliability

... deterministic secret sharing scheme the Security analysis demonstrate that our scheme is secure in terms of the definitions specified in the proposed security ...usedeterministic secret ... See full document

5

Secure Data Collection in Wireless Sensor Networks using Randomized Dispersive Routes

Secure Data Collection in Wireless Sensor Networks using Randomized Dispersive Routes

... WSN: secret sharing of information, randomized propagation of each information share, and normal routing ...MÞ-threshold secret sharing algorithm, ...the secret shares can be propagated ... See full document

7

A Study on Multisecret-Sharing Schemes Based on Linear Codes

A Study on Multisecret-Sharing Schemes Based on Linear Codes

... Secret sharing has been a subject of study since 1979. In the secret sharing schemes there are some participants and a ...a secret. The main principle is to distribute a secret ... See full document

9

On  the  Power  of  Amortization  in  Secret  Sharing: $d$-Uniform  Secret  Sharing   and  CDS  with  Constant  Information  Rate

On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate

... the secret s if and only if f(x, y) = ...the secret-sharing problem as the problem of realizing a CDS for the predicate f and vice-versa by setting the share of the x-th player ... See full document

28

Nearly optimal asset allocations in retirement

Nearly optimal asset allocations in retirement

... the optimal asset allocation during retirement? This article provides a brief but simple message that conservative asset allocations in retirement are quite acceptable after ... See full document

10

A New Approach to Construct Secret Sharing Schemes Based on Field Extensions

A New Approach to Construct Secret Sharing Schemes Based on Field Extensions

... Abstract. Secret sharing has been a subject of study since ...a secret key, passwords, information of the map of a secret place or an important formula must be kept ...the secret into ... See full document

8

MULTI-LEVEL KEY DISTRIBUTION ALGORITHM FOR SECRET KEY RECOVERY SYSTEM

MULTI-LEVEL KEY DISTRIBUTION ALGORITHM FOR SECRET KEY RECOVERY SYSTEM

... the secret by user as well as support law enforcement for the ...importance secret key due to more chances of brute force or higher possibility for collusion as the Key Recovery Agents ...the secret ... See full document

11

Revisiting  Secure  Two-Party  Computation  with  Rational  Players

Revisiting Secure Two-Party Computation with Rational Players

... The shares are signed by the dealer. Hence, no player can give out false shares undetected and the only possible action of a player in a round is to either 1) send the message or 2) remain silent. The round in which the ... See full document

13

On  Cryptographic  Anonimity   and  Unpredicatbility  in  Secret  Sharing

On Cryptographic Anonimity and Unpredicatbility in Secret Sharing

... the secret can be recovered by anyone, otherwise it remain ...the sharing protocol in any way (step 1 is implemented by a pro- gram running on each computer and nobody tinkers with their ...the ... See full document

10

A Review on Visual Secret Sharing Schemes

A Review on Visual Secret Sharing Schemes

... original secret can be printed directly on the share ...Next secret sharing method is applied to each color channel ...the secret is encoded at bit-level which improves image ...that ... See full document

5

Secret  Sharing   and  Statistical  Zero  Knowledge

Secret Sharing and Statistical Zero Knowledge

... Efficient Secret-Sharing Schemes. Consider secret sharing schemes that are defined not for a given access structure, but uniformly for some class of access ...The sharing algorithm in ... See full document

26

A Survey on Secret Sharing by Visual Cryptography

A Survey on Secret Sharing by Visual Cryptography

...  [4] Strengthen the Security of Confidential Information utilizing Cryptographic Technique by Prasanna Kumar H.R and Dr. Niranjan N Chiplunkar, are utilized two strategies, in the main technique they encode the ... See full document

5

Leakage  Resilient  Secret  Sharing   and  Applications

Leakage Resilient Secret Sharing and Applications

... Defining Leakage Tolerance. We extend the above definition of security to also account for possible leakage from the states of honest parties. Specifically, we define the notion of leakage tolerance for an MPC protocol ... See full document

42

KAD II. SECRET

KAD II. SECRET

... The digital world today has brought with it a great demand for information security products. The security aspects of these products are based extensively on the advancements in the science of Cryptology. The techniques ... See full document

6

Show all 10000 documents...