搜索结果: 1-15 共查到“军事学 Secret sharing scheme”相关记录32条 . 查询时间(0.076 秒)
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
secret sharing multiplicative verifiability
2018/1/27
In this paper, we point out flaws in an existing verifiably multiplicative secret sharing (VMSS) scheme. Namely, we show that a scheme proposed by Yoshida and Obana presented at ICITS 2017 is insecure...
Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method
Dynamic threshold Linear subspace Forging
2017/11/14
A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn et.al., in 2015. In this scheme, a (t; n) secret sharing scheme in secret reconstruction phase can t...
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)
conditionally secure secret sharing secrecy computation
2017/7/28
Typically, when secrecy multiplication is performed in multiparty computation using Shamir’s (k,n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead of k-1. This ...
Sharing a secret efficiently amongst a group of participants is not easy since there is always an adversary / eavesdropper trying to retrieve the secret. In secret sharing schemes, every participant i...
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme
Secret sharing threshold robust
2016/12/8
In 2010, Resch and Plank proposed a computationally secure secret sharing scheme,
called the AONT-RS scheme. We present a generalisation of their scheme and discuss
two ways in which information is ...
An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency
cheater identifiable secret sharing share size rushing adversary
2016/1/8
In this paper, we present an efficient k-out-of-n secret sharing scheme, which can identify up to t rushing cheaters, with probability at least 1−ϵ, where 0<ϵ<1/2, provided tTh...
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
implementation Secret sharing
2016/1/6
Shamir’s secret sharing scheme is an effective way to distribute secret to a group of
shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect
the system from ch...
On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
secret sharing entropy idealness
2016/1/5
A necessary and sufficient condition for the asymptotic idealness of the AsmuthBloom
threshold secret sharing scheme is proposed. Apart from this, a comprehensive analysis
of the known variants of t...
An ideal multi-secret sharing scheme based on minimal privileged coalitions
applications secret sharing
2013/2/21
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Appl...
On the Security of a Cheating Immune Visual Secret Sharing Scheme
applications / Visual Cryptography Visual Secret Sharing Cheating
2012/6/14
Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identificatio...
On the Security of a Cheating Immune Visual Secret Sharing Scheme
applications / Visual Cryptography Visual Secret Sharing Cheating, Cheating Prevention Cheating Immune Scheme
2012/3/22
Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identificatio...
On the Security of a Cheating Immune Visual Secret Sharing Scheme
applications / Visual Cryptography Visual Secret Sharing Cheating Cheating Prevention Cheating Immune Scheme
2012/3/21
Visual Secret Sharing (VSS), first invented by Naor and Shamir, is a variant of secret sharing. In the literature, VSS schemes have many applications, including visual authentication and identificatio...
Protecting AES with Shamir's Secret Sharing Scheme
Side Channel Analysis (SCA) Masking AES Implementation Shamir's Secret Sharing Multi-party computation
2012/3/26
Cryptographic algorithms embedded on physical devices are particularly vulnerable to Side Channel Analysis (SCA). The most common countermeasure for block cipher implementations is masking, which rand...
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)
rational cryptography computational strict Nash equilib-rium
2011/7/25
The design of rational cryptographic protocols is a recently created research area at the intersection of cryptography and game theory. At TCC'10, Fuchsbauer \emph{et al.} introduced two equilibrium n...
Simple and Asymptotically Optimal $t$-Cheater Identifiable Secret Sharing Scheme
Secret Sharing Cheater Identification Share Size
2011/7/25
In this paper, we consider the problem of k-out-of-n secret sharing scheme, capable of identifying t cheaters. We design a very simple k-out-of-n secret sharing scheme, which can identify up to t chea...