Space-Efficient Verifiable Secret Sharing Using Polynomial Interpolation - 2018


Preserving information confidentiality in clouds may be a key issue. Secret Sharing, a cryptographic primitive for the distribution of a secret among a group of n participants designed so that solely subsets of shareholders of cardinality zero <; t = n are allowed to reconstruct the secret by pooling their shares, can help mitigating and minimizing the problem. A desirable feature of Secret Sharing schemes is cheater detection, i.e., the flexibility to detect a number of malicious shareholders making an attempt to reconstruct the secret by getting legal shares from the opposite shareholders whereas providing them with pretend shares. Verifiable Secret Sharing schemes solve this drawback by allowing shareholders verifying the others' shares. We present new verification algorithms providing arbitrary secret sharing schemes with cheater detection capabilities, and prove their house potency with regard to other schemes appeared within the literature. We tend to additionally introduce, in one among our schemes, the Exponentiating Polynomial Root Downside (EPRP), that is believed to be NP-Intermediate and thus difficult.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Video Dissemination over Hybrid Cellular and Ad Hoc Networks - 2014 ABSTRACT: We study the problem of disseminating videos to mobile users by using a hybrid cellular and ad hoc network. In particular, we formulate
PROJECT TITLE : Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks - 2014 ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective
PROJECT TITLE : PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks - 2014 ABSTRACT: Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking,
PROJECT TITLE : Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks - 2014 ABSTRACT: We study cross-layer design in random-access-based fixed wireless multihop networks under a physical
PROJECT TITLE : Cross-Layer Approach for Minimizing Routing Disruption in IP Networks - 2014 ABSTRACT: Backup paths are widely used in IP networks to protect IP links from failures. However, existing solutions such as the commonly

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry