Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography

来源 :通讯、网络与系统学国际期刊(英文) | 被引量 : 0次 | 上传用户:yangying_han
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cann
其他文献
The deployment of smart metering provides an immense amount of data for power grid operators and energy providers. By using this data, a more efficient and flex
明孝陵(参见本刊2005年第12期14页)因朱元璋“以幸治天下”而得名,地面木建筑大多毁于1853年清军与太平军之战。现存陵寝主体建筑和神道作为明清皇家陵寝的扩展部分列人《世界
Energy consumption in data centers has grown out of proportion in regard to the state of energy that’s available in the universe. Technology has improved servi
Generic Object Oriented Substation Event (GOOSE) Messages face a great challenge in its communication requirements especially in latency point of view. The appe
High-throughput satellite (HTS) systems usually make use of Multibeam coverage at high frequency bands in order to offer broadband access of large areas. Multib
In disaster situations, people need to evacuate from dangerous areas to safe ones. In particular, they must formulate an evacuation plan for themselves when the
The mobile ad hoc network (MANET) with infrastructure networks (hybrid networks) has several practical uses. The utility of hybrid network is increased in real
The relation between the HRM and the firm performance is analyzed statistically by many researchers in the literature. However, there are very few nonlinear app
Diagnoses of heart diseases can be done effectively on long term recordings of ECG signals that preserve the signals’ morphologies. In these cases, the volume
In this paper, we present a predictive prefetching mechanism that is based on probability graph approach to perform prefetching between different levels in a pa