検索結果 3 件

デジタル記事
2016-01-04Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication
全国の図書館
  • 参照Cross-group secret sharing scheme for secure usage of cloud storage over different providers and ...
  • 参照A Verifiable (t, n) Multiple Secret Sharing Scheme and Its......es A Review of Secret Sharing Schemes Changi......the Absence of Secure Channels How t......old changeable secret sharing schemes revisited A Layered Secret Sharing Scheme for Automated Profile Sharing in OSN Groups ......actical scheme for non-interactive verifiable secret sharing Verifiable secret sharing and achieving ......ults Proactive Secret Sharing Or: How to Cop......How to share a secret Safeguarding c......phic keys Multisecret-sharing scheme based o......hted threshold secret sharing based on the Chinese remainde...
デジタル記事
Ke, Chenyutao, 穴田, 啓晃, 川本, 淳平, Morozov, Kirill, 櫻井, 幸一ACMProceedings of the 10th International Conference on Ubiquitous Information Management and Communication
インターネットで読める全国の図書館
  • 件名Storage Service Shamir Secret Sharing Cross-group Secret Sharing
  • 一般注記...n Ubiquitous Information Management and Communic...
デジタル記事
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication
インターネットで読める全国の図書館
  • 要約等...servers of the storage providers such...... this context, secret sharing can be used to......falsification. Secret sharing is one of the ......he distributed storage. However, few ......er may recover secret data illegally......to recover the secret. In this paper...... two-threshold secret sharing scheme in order to enforce a new type of cross-group policy. By com......f-m providers’ secret sharing scheme and a k......-of-n servers’ secret sharing scheme via a o...... a scheme that forces k shares to......n Ubiquitous Information Management and Communic...
  • 件名Storage Service Shamir Secret Sharing Cross-group Secret Sharing

検索結果は以上です。