• 沒有找到結果。

Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System

N/A
N/A
Protected

Academic year: 2021

Share "Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System"

Copied!
10
0
0

加載中.... (立即查看全文)

全文

Loading

數據

Fig. 1.  The threshold change protocol (case 1): P i  and P j
Table 1. Comparisons in complexity
Fig.  3.  A  project  generation  organization  upon  the  secret  sharing application using our protocols in Sec

參考文獻

相關文件

( tongjiao). This represents the earliest stratum of Diamond Sutra comme ntary.. 2)Explanation of the Diamond Sutra (Jin'gangjing jieyi) and Secret Oral T eachings on theDiamond

Prize-presentation Ceremony cum Sharing Sessions of the Junior Secondary History e-Reading Award Scheme 2019 and Highlights of learning & teaching strategies in History

 Propose eQoS, which serves as a gene ral framework for reasoning about th e energy efficiency trade-off in int eractive mobile Web applications.  Demonstrate a working prototype and

 Create and present information and ideas for the purpose of sharing and exchanging by using information from different sources, in view of the needs of the audience. 

 Create and present information and ideas for the purpose of sharing and exchanging by using information from different sources, in view of the needs of the audience. 

The min-max and the max-min k-split problem are defined similarly except that the objectives are to minimize the maximum subgraph, and to maximize the minimum subgraph respectively..

As a result banks should be so proactive as if they are doing the marketing job to make their employees feel the importance of internal marketing, who can only in

Kyunghwi Kim and Wonjun Lee, “MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks,” The 16th IEEE International Conference on Computer Communications