Sciweavers

1054 search results - page 15 / 211
» Secret Communication with Feedback
Sort
View
TCC
2009
Springer
154views Cryptology» more  TCC 2009»
15 years 10 months ago
Fairness with an Honest Minority and a Rational Majority
We provide a simple protocol for secret reconstruction in any threshold secret sharing scheme, and prove that it is fair when executed with many rational parties together with a s...
Shien Jin Ong, David C. Parkes, Alon Rosen, Salil ...
CIS
2007
Springer
15 years 4 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...
CORR
2007
Springer
105views Education» more  CORR 2007»
14 years 9 months ago
On Real-Time Communication Systems with Noisy Feedback
— We consider a real--time communication system with noisy feedback consisting of a Markov source, a forward and a backward discrete memoryless channels, and a receiver with fin...
Aditya Mahajan, Demosthenis Teneketzis
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
15 years 1 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
TSP
2008
90views more  TSP 2008»
14 years 9 months ago
Minimizing Transmit Power for Coherent Communications in Wireless Sensor Networks With Finite-Rate Feedback
We minimize average transmit power with finite-rate feedback for coherent communications in a wireless sensor network (WSN), where sensors communicate with a fusion center using ad...
Antonio G. Marqués, Xin Wang, Georgios B. G...