搜索结果: 1-9 共查到“军队指挥学 access structure”相关记录9条 . 查询时间(0.078 秒)
A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio
secret sharing general access structures information ratio
2019/6/3
The contribution vector (convec) of a secret sharing scheme is the vector of all share sizes divided by the secret size. A measure on the convec (e.g., its maximum or average) is considered as a crite...
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More
blockchain, access structure, trusted hardware
2018/1/29
Suppose that NN players share cryptocurrency using an M-of-N multisig scheme. If N-M+1 players disappear, the remaining ones have a problem: They’ve permanently lost their funds. We introduce Paralysi...
The complexity of the connected graph access structure on seven participants
Access structure Complexity Secret sharing scheme
2016/12/8
In this paper, we study an important problem in secret sharing that
determines the exact value or bound for the complexity. First, we used induced
subgraph complexity of the graph G with access stru...
Sequential Secret Sharing as a New Hierarchical Access Structure
Secret Sharing Access Structure Dynamic Scheme
2015/12/31
Due to the rapid growth of the next generation networking and system technologies, computer networks
require new design and management. In this context, security, and more specifically, access
struc...
Are you The One to Share? Secret Transfer with Access Structure
oblivious transfer access structure secret sharing
2015/12/22
Sharing information to others is common nowadays, but the question is with
whom to share. To address this problem, we propose the notion of secret transfer with
access structure (STAS). STAS is a tw...
The Optimal Linear Secret Sharing Scheme for Any Given Access Structure
cryptographic protocols
2012/3/29
Any linear code can be used to construct a linear secret sharing scheme. In this paper, it is shown how to decide optimal linear codes (i.e., with the biggest information rate) realizing a given acces...
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
Secret sharing Compartmented access structure Ideality
2009/7/1
In a compartmented access structure, there are disjoint participants
C1, . . . ,Cm. The access structure consists of subsets of participants
containing at least ti from Ci for i = 1, . . . ,m, and a...
Applying General Access Structure to Proactive Secret Sharing Schemes
General Access Structure Proactive Secret Sharing Schemes
2009/4/15
Verifiable secret sharing schemes (VSS) are secret sharing
schemes (SSS) dealing with possible cheating by participants. In this
paper we use the VSS proposed by Cramer, Damgard and Maurer [6, 7, 5]...
Applying General Access Structure to Metering Schemes
General Access Structure Metering Schemes
2009/4/15
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced
metering schemes secure against coalition of corrupt servers and clients. In their schemes
any server is able to ...