computer communications
Recently Published Documents


TOTAL DOCUMENTS

578
(FIVE YEARS 93)

H-INDEX

18
(FIVE YEARS 0)

2021 ◽  
pp. 167-170
Author(s):  
Laszlo Solymar

Wars, as usual, are responsible for many technical advances. Among the most significant was the invention of new devices capable of producing higher frequencies which were to be called microwaves. This made possible the emergence of radar both for military and civil communications and sometime later Long Distance Communications was realized by microwave links where information was sent from tower to tower. Microwave networks were built in all industrialized countries. It was followed by satellite communications, first passive (relying on signal reflection) and later active, that re-radiated signal. The first mobile phones also used microwave frequencies. Further advances like digitalization, optical fibres, and inter-computer communications are introduced.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Chingfang Hsu ◽  
Lein Harn ◽  
Shan Wu ◽  
Lulu Ke

Secret sharing (SS) schemes have been widely used in secure computer communications systems. Recently, a new type of SS scheme, called the secure secret reconstruction scheme (SSRS), was proposed, which ensures that the secret can only be recovered by participants who present valid shares. In other words, if any outside adversary participated in the secret reconstruction without knowing any valid share, the secret cannot be recovered by anyone including the adversary. However, the proposed SSRS can only prevent an active attacker from obtaining the recovered secret, but cannot prevent a passive attacker from obtaining the secret since exchange information among participants is unprotected. In this paper, based on bivariate polynomials, we propose a novel design for the SSRS that can prevent both active and passive attackers. Furthermore, we propose a verification scheme which can verify all shares at once, i.e., it allows all shareholders to efficiently verify that their shares obtained from the dealer are generated consistently without revealing their shares and the secret. The proposed scheme is really attractive for efficient and secure secret reconstruction in communications systems.


Sign in / Sign up

Export Citation Format

Share Document