Generalised cheater detection and identification
Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify...
Uložené v:
| Vydané v: | IET information security Ročník 8; číslo 3; s. 171 - 178 |
|---|---|
| Hlavný autor: | |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Stevenage
The Institution of Engineering and Technology
01.05.2014
John Wiley & Sons, Inc |
| Predmet: | |
| ISSN: | 1751-8709, 1751-8717 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and identifiability of cheaters are proportional to the number of redundant shares. However, the number of redundant shares, j − t is fixed if original shares are used in the secret reconstruction. So, a threshold changeable verifiable secret sharing (TCVSS) has been developed, which allows shareholders working together to change the threshold t into a new threshold t′ (i.e. t′ < j) and generate new shares; whereas at the same time, maintain the original secret. The verifiability of the proposed TCVSS enables shareholders to verify that their new shares have been properly generated. The number of redundant shares can be changed to j − t′ if new shares are used in the secret reconstruction. Discussion on how to determine the new threshold t′ in order to detect and identify cheaters successfully has also been included. |
|---|---|
| AbstractList | Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j ) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and identifiability of cheaters are proportional to the number of redundant shares. However, the number of redundant shares, j − t is fixed if original shares are used in the secret reconstruction. So, a threshold changeable verifiable secret sharing (TCVSS) has been developed, which allows shareholders working together to change the threshold t into a new threshold t ′ (i.e. t ′ < j ) and generate new shares; whereas at the same time, maintain the original secret. The verifiability of the proposed TCVSS enables shareholders to verify that their new shares have been properly generated. The number of redundant shares can be changed to j − t ′ if new shares are used in the secret reconstruction. Discussion on how to determine the new threshold t ′ in order to detect and identify cheaters successfully has also been included. Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and identifiability of cheaters are proportional to the number of redundant shares. However, the number of redundant shares, j - t is fixed if original shares are used in the secret reconstruction. So, a threshold changeable verifiable secret sharing (TCVSS) has been developed, which allows shareholders working together to change the threshold t into a new threshold t' (i.e. t' < j) and generate new shares; whereas at the same time, maintain the original secret. The verifiability of the proposed TCVSS enables shareholders to verify that their new shares have been properly generated. The number of redundant shares can be changed to j - t' if new shares are used in the secret reconstruction. Discussion on how to determine the new threshold t' in order to detect and identify cheaters successfully has also been included. Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold) shares, for example j (i.e. t < j) shares in the secret reconstruction, then redundancy of shares can be used to detect and identify cheaters. The detectability and identifiability of cheaters are proportional to the number of redundant shares. However, the number of redundant shares, j − t is fixed if original shares are used in the secret reconstruction. So, a threshold changeable verifiable secret sharing (TCVSS) has been developed, which allows shareholders working together to change the threshold t into a new threshold t′ (i.e. t′ < j) and generate new shares; whereas at the same time, maintain the original secret. The verifiability of the proposed TCVSS enables shareholders to verify that their new shares have been properly generated. The number of redundant shares can be changed to j − t′ if new shares are used in the secret reconstruction. Discussion on how to determine the new threshold t′ in order to detect and identify cheaters successfully has also been included. |
| Author | Harn, Lein |
| Author_xml | – sequence: 1 givenname: Lein surname: Harn fullname: Harn, Lein email: harnl@umkc.edu organization: Department of Computer Science Electrical Engineering, University of Missouri, Kansas City, USA |
| BookMark | eNqFkE1rGzEQQEVJoc7HD8jNkEt6WHdGu9qVekuD7RgCOdg9C1kaUYXNriOtKfn30dYlFNO0Jwnxnph5p-yk6zti7BJhhlCpL4GGIvg044B8BqXED2yCjcBCNticvN1BfWKnKT0CiFqAmjBYUkfRtCGRm9ofZAaKU0cD2SH03dR0bhocdUPwwZrx6Zx99KZNdPH7PGPfF_PN7V1x_7Bc3d7cF7ZqOC8ESbLOkCJvK2WFRA4KeNlQWSpFPEMWcSuEd87XWy55A1JYJ9ELgxzLM3Z9-HcX--c9pUE_hWSpbU1H_T5prDlAUymQGb06Qh_7fezydBqFkLKqhSwz1RwoG_uUInltw_BrpSGa0GoEPZbUuaTOJfVYUo8ls4lH5i6GJxNf_ul8PTg_Q0sv_xf0aj3n3xYAUPMsfz7II_a2y2q-0avF-g9n53xmi7-w7w_2ChYRpyA |
| CitedBy_id | crossref_primary_10_1049_iet_ifs_2019_0203 crossref_primary_10_1080_00207160_2025_2493959 crossref_primary_10_3390_s22010331 crossref_primary_10_1155_2019_5134534 |
| Cites_doi | 10.1109/SFCS.1987.4 10.1007/978-3-540-30539-2_13 10.1007/3-540-46766-1_9 10.1007/3-540-48329-2_10 10.1007/11937807_9 10.1016/j.ins.2010.04.016 10.1007/3-540-44750-4_27 10.1007/978-3-540-89641-8_14 10.1007/3-540-47721-7_19 10.1145/358746.358762 10.1007/s10623-008-9265-8 10.1109/SFCS.1985.64 10.1007/3-540-46513-8_15 10.1023/A:1008200702849 10.1007/3-540-57843-9_11 10.1007/3-540-44750-4_33 10.1007/3-540-47719-5_32 10.1145/73007.73014 10.1007/3-540-48970-3_15 10.1145/359168.359176 10.1109/AINA.2010.56 10.1109/IEEC.2009.54 10.1007/3-540-48285-7_10 10.1007/978-3-642-14496-7_7 10.1007/BF02252871 |
| ContentType | Journal Article |
| Copyright | The Institution of Engineering and Technology 2020 The Institution of Engineering and Technology Copyright The Institution of Engineering & Technology May 2014 |
| Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2020 The Institution of Engineering and Technology – notice: Copyright The Institution of Engineering & Technology May 2014 |
| DBID | AAYXX CITATION 3V. 7XB 8AL 8FE 8FG 8FK ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M0N M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS Q9U S0W 7SC 7SP 8FD F28 FR3 L7M L~C L~D |
| DOI | 10.1049/iet-ifs.2012.0381 |
| DatabaseName | CrossRef ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Database ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Database ProQuest Central Essentials Local Electronic Collection Information ProQuest Central Technology collection ProQuest One ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Computing Database Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ProQuest Central Basic DELNET Engineering & Technology Collection Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection ProQuest Computing Engineering Database ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest DELNET Engineering and Technology Collection Materials Science & Engineering Collection ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Technology Research Database Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1751-8717 |
| EndPage | 178 |
| ExternalDocumentID | 3419643941 10_1049_iet_ifs_2012_0381 ISE2BF00062 |
| Genre | article Feature |
| GroupedDBID | 0R 24P 29I 3V. 4.4 5GY 6IK 8AL 8FE 8FG AAJGR ABJCF ABUWG ACGFS ACIWK AENEX AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BFFAM BGLVJ BPHCQ CS3 DU5 DWQXO EBS EJD GNUQQ HCIFZ HZ IFIPE IPLJI JAVBF K6V K7- L6V LAI LOTEE LXI LXU M0N M43 M7S NADUK NXXTH O9- OCL P2P P62 PQEST PQQKQ PQUKI PROAC PTHSS RIE RIG RNS RUI S0W UNMZH UNR ZZ .DC 0R~ 0ZK 1OC AAHHS AAHJG ABMDY ABQXS ACCFJ ACCMX ACESK ACGFO ADEYR ADZOD AEEZP AEGXH AEQDE AIAGR AIWBW AJBDE ALUQN AVUZU CCPQU GROUPED_DOAJ HZ~ IAO ITC MCNEO OK1 ROL ~ZZ AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IDLOA PHGZM PHGZT PQGLB WIN 7XB 8FK JQ2 PKEHL PRINS Q9U 7SC 7SP 8FD F28 FR3 L7M L~C L~D PUEGO |
| ID | FETCH-LOGICAL-c4722-5e8ecdae9efc49c5812090237e3399e2472c11b55fddf6b2827085cd81f5a1213 |
| IEDL.DBID | BENPR |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000335178600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1751-8709 |
| IngestDate | Thu Sep 04 17:10:02 EDT 2025 Wed Aug 13 08:14:55 EDT 2025 Wed Oct 29 21:43:45 EDT 2025 Tue Nov 18 22:27:20 EST 2025 Wed Jan 22 16:32:42 EST 2025 Thu May 09 18:13:39 EDT 2019 Tue Jan 05 21:44:05 EST 2021 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Keywords | share redundancy interpolation secret reconstruction process polynomials TCVSS cryptography threshold changeable verifiable secret sharing Lagrange interpolating polynomial generalised cheater identification generalised cheater detection |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4722-5e8ecdae9efc49c5812090237e3399e2472c11b55fddf6b2827085cd81f5a1213 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
| OpenAccessLink | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/iet-ifs.2012.0381 |
| PQID | 1558846583 |
| PQPubID | 1936350 |
| PageCount | 8 |
| ParticipantIDs | proquest_miscellaneous_1620074908 proquest_journals_1558846583 iet_journals_10_1049_iet_ifs_2012_0381 crossref_primary_10_1049_iet_ifs_2012_0381 wiley_primary_10_1049_iet_ifs_2012_0381_ISE2BF00062 crossref_citationtrail_10_1049_iet_ifs_2012_0381 |
| ProviderPackageCode | RUI |
| PublicationCentury | 2000 |
| PublicationDate | May 2014 |
| PublicationDateYYYYMMDD | 2014-05-01 |
| PublicationDate_xml | – month: 05 year: 2014 text: May 2014 |
| PublicationDecade | 2010 |
| PublicationPlace | Stevenage |
| PublicationPlace_xml | – name: Stevenage |
| PublicationTitle | IET information security |
| PublicationYear | 2014 |
| Publisher | The Institution of Engineering and Technology John Wiley & Sons, Inc |
| Publisher_xml | – name: The Institution of Engineering and Technology – name: John Wiley & Sons, Inc |
| References | Shamir, A. (C1) 1979; 22 He, J.; Dawson, E. (C6) 1998; 14 Harn, L.; Lin, C. (C9) 2009; 52 Harn, L.; Lin, C. (C25) 2010; 180 Tompa, M.; Wollm, H. (C2) 1989; 1 McEliece, R.J.; Sarwate, D.V. (C7) 1981; 24 Martin, K.; Pieprzyk, J.; Safavi-Naini, R.; Wang, H. (C10) 1999; 31 2009; 52 1989; 1 2001 2000 2010 2009 1987 1981; 24 2008 1985 1995 2006 1994 1999; 31 1993 2004 1992 2010; 180 1979; 22 1989 1998; 14 1999 e_1_2_7_5_2 e_1_2_7_4_2 e_1_2_7_3_2 e_1_2_7_2_2 e_1_2_7_9_2 e_1_2_7_8_2 e_1_2_7_7_2 e_1_2_7_6_2 e_1_2_7_19_2 Martin K. (e_1_2_7_11_2) 1999; 31 e_1_2_7_18_2 e_1_2_7_17_2 e_1_2_7_16_2 e_1_2_7_15_2 e_1_2_7_14_2 e_1_2_7_13_2 e_1_2_7_12_2 e_1_2_7_10_2 e_1_2_7_26_2 e_1_2_7_27_2 e_1_2_7_28_2 e_1_2_7_25_2 e_1_2_7_24_2 e_1_2_7_23_2 e_1_2_7_22_2 e_1_2_7_21_2 e_1_2_7_20_2 |
| References_xml | – volume: 31 start-page: 34 year: 1999 end-page: 43 ident: C10 article-title: Changing thresholds in the absence of secure channels publication-title: J. Australian Comput. – volume: 1 start-page: 133 issue: 3 year: 1989 end-page: 138 ident: C2 article-title: How to share a secret with cheaters publication-title: J. Cryptol. – volume: 180 start-page: 3059 issue: 16 year: 2010 end-page: 3064 ident: C25 article-title: Strong ( , , ) verifiable secret sharing scheme publication-title: Inf. Sci. – volume: 24 start-page: 583 issue: 9 year: 1981 end-page: 584 ident: C7 article-title: On sharing secrets and Reed-Solomon codes publication-title: Commun. ACM – volume: 14 start-page: 221 issue: 3 year: 1998 end-page: 237 ident: C6 article-title: Shared secret reconstruction publication-title: Des. Codes Cryptogr. – volume: 52 start-page: 15 issue: 1 year: 2009 end-page: 24 ident: C9 article-title: Detection and identification of cheaters in ( , ) secret sharing scheme publication-title: Des. Codes Cryptogr. – volume: 22 start-page: 612 issue: 11 year: 1979 end-page: 613 ident: C1 article-title: How to share a secret publication-title: Commun. ACM – start-page: 74 year: 2010 end-page: 92 article-title: Efficient statistical asynchronous verifiable secret sharing with optimal resilience – start-page: 200 year: 2000 end-page: 214 article-title: Unconditionally secure proactive secret sharing scheme with combinatorial structures – start-page: 403 year: 2001 end-page: 416 article-title: Efficient and unconditionally secure verifiable threshold changeable scheme – start-page: 110 year: 1993 end-page: 125 article-title: Fully dynamic secret sharing schemes – start-page: 73 year: 1989 end-page: 85 article-title: Verifiable secret sharing and multiparty protocols with honest majority – volume: 1 start-page: 133 issue: 3 year: 1989 end-page: 138 article-title: How to share a secret with cheaters publication-title: J. Cryptol. – volume: 52 start-page: 15 issue: 1 year: 2009 end-page: 24 article-title: Detection and identification of cheaters in ( , ) secret sharing scheme publication-title: Des. Codes Cryptogr. – start-page: 427 year: 1987 end-page: 437 article-title: A practical scheme for non‐interactive verifiable secret sharing – start-page: 196 year: 2008 end-page: 213 article-title: Analysis and design of multiple threshold changeable secret sharing schemes – start-page: 251 year: 1987 end-page: 260 article-title: Secret sharing homomorphisms: keeping shares of a secret secret – year: 2010 – start-page: 129 year: 1992 end-page: 140 article-title: Non‐interactive and information‐theoretic secure verifiable secret sharing – start-page: 383 year: 1985 end-page: 395 article-title: Verifiable secret sharing and achieving simultaneously in the presence of faults – start-page: 238 year: 2009 end-page: 246 article-title: A secret sharing scheme with the changeable threshold value – start-page: 745 year: 2010 end-page: 752 article-title: Collusion attack resistance and practice‐oriented threshold changeable sharing schemes – start-page: 118 year: 1994 end-page: 125 article-title: Size of shares and probability of cheating in threshold schemes – volume: 24 start-page: 583 issue: 9 year: 1981 end-page: 584 article-title: On sharing secrets and Reed‐Solomon codes publication-title: Commun. ACM – start-page: 339 year: 1995 end-page: 352 article-title: Proactive secret sharing or: how to cope with perpetual leakage – start-page: 177 year: 1999 end-page: 19 article-title: Changing thresholds in the absence of secure channels – start-page: 410 year: 1995 end-page: 423 article-title: ‐cheater identifiable ( , ) secret sharing schemes – volume: 14 start-page: 221 issue: 3 year: 1998 end-page: 237 article-title: Shared secret reconstruction publication-title: Des. Codes Cryptogr. – volume: 31 start-page: 34 year: 1999 end-page: 43 article-title: Changing thresholds in the absence of secure channels publication-title: J. Australian Comput. – start-page: 82 year: 1993 end-page: 89 article-title: Secret sharing schemes with veto capabilities – start-page: 103 year: 2006 end-page: 117 article-title: Dynamic threshold and cheater resistance for Shamir secret sharing scheme – start-page: 170 year: 2004 end-page: 186 article-title: Lattice‐based threshold changeability for standard Shamir secret‐sharing schemes – volume: 180 start-page: 3059 issue: 16 year: 2010 end-page: 3064 article-title: Strong ( , , ) verifiable secret sharing scheme publication-title: Inf. Sci. – volume: 22 start-page: 612 issue: 11 year: 1979 end-page: 613 article-title: How to share a secret publication-title: Commun. ACM – ident: e_1_2_7_21_2 doi: 10.1109/SFCS.1987.4 – ident: e_1_2_7_19_2 doi: 10.1007/978-3-540-30539-2_13 – ident: e_1_2_7_22_2 doi: 10.1007/3-540-46766-1_9 – ident: e_1_2_7_12_2 doi: 10.1007/3-540-48329-2_10 – ident: e_1_2_7_20_2 doi: 10.1007/11937807_9 – ident: e_1_2_7_26_2 doi: 10.1016/j.ins.2010.04.016 – ident: e_1_2_7_27_2 doi: 10.1007/3-540-44750-4_27 – ident: e_1_2_7_13_2 doi: 10.1007/978-3-540-89641-8_14 – volume: 31 start-page: 34 year: 1999 ident: e_1_2_7_11_2 article-title: Changing thresholds in the absence of secure channels publication-title: J. Australian Comput. – ident: e_1_2_7_23_2 doi: 10.1007/3-540-47721-7_19 – ident: e_1_2_7_8_2 doi: 10.1145/358746.358762 – ident: e_1_2_7_10_2 doi: 10.1007/s10623-008-9265-8 – ident: e_1_2_7_17_2 doi: 10.1109/SFCS.1985.64 – ident: e_1_2_7_24_2 doi: 10.1007/3-540-46513-8_15 – ident: e_1_2_7_7_2 doi: 10.1023/A:1008200702849 – ident: e_1_2_7_9_2 doi: 10.1007/3-540-57843-9_11 – ident: e_1_2_7_6_2 doi: 10.1007/3-540-44750-4_33 – ident: e_1_2_7_14_2 doi: 10.1007/3-540-47719-5_32 – ident: e_1_2_7_4_2 doi: 10.1145/73007.73014 – ident: e_1_2_7_18_2 doi: 10.1007/3-540-48970-3_15 – ident: e_1_2_7_2_2 doi: 10.1145/359168.359176 – ident: e_1_2_7_16_2 doi: 10.1109/AINA.2010.56 – ident: e_1_2_7_15_2 doi: 10.1109/IEEC.2009.54 – ident: e_1_2_7_5_2 doi: 10.1007/3-540-48285-7_10 – ident: e_1_2_7_25_2 doi: 10.1007/978-3-642-14496-7_7 – ident: e_1_2_7_3_2 doi: 10.1007/BF02252871 – ident: e_1_2_7_28_2 |
| SSID | ssj0056509 |
| Score | 1.9599949 |
| Snippet | Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need... |
| SourceID | proquest crossref wiley iet |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 171 |
| SubjectTerms | Algorithms Computer information security cryptography Electric power distribution generalised cheater detection generalised cheater identification interpolation Lagrange interpolating polynomial polynomials Reconstruction Redundancy Redundant secret reconstruction process share redundancy TCVSS threshold changeable verifiable secret sharing Thresholds |
| SummonAdditionalLinks | – databaseName: Wiley Online Library Open Access dbid: 24P link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwED_m9MEX5ydOp1QRH4RiuzZr-qhjw72MwSbsLaRJCgXpxtb593vXj7khTBBfm0sId7ncNXf3O4AH5UnCZZO2UU5s-8xx7FD6js0iQt_3Yq6iotlEMBzy6TQc1aBb1cIU-BDrBzfSjPy-JgWXUdGFBJ1aFGJiMjuJCXGbnvM8Kr_ed10voKPd9kfVdcxoK3lVJHNR9Z1wHdoMn38ssWWc9nB4y-_c9F5z89Nv_MvGj-Go9D6tl-K4nEDNpKfQqDo7WKWin4FTolEnS6MtRfc1jmqT5XlbqSVTbSW6zDPKRXsO7_3epPtml70VbEXwkDYz3CgtTWhi5YeKcaqhRfsdGA9dFtNGIuW6EWOx1nEnwh-zAJ0zpbkbM0kwcBdQT2epuQSLRS6X0tWKB8pnQRRyzaUK0PFUaP2juAlOxVShSuBx6n_xIfIAuB8K5IhAjgjiiCCONOFpPWVeoG7sIn6kb6XuLXcR3m8RDnoTMeiPvwnEXONuW5XEN5ZkVM-LzprXhLv1MCoiRVdkamYrpOnQsy_FUZvg5fL_fetiMO61XynBs9O--tOsazjE736RgtmCerZYmRs4UJ9Zslzc5prwBfeDCFE priority: 102 providerName: Wiley-Blackwell |
| Title | Generalised cheater detection and identification |
| URI | http://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2012.0381 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-ifs.2012.0381 https://www.proquest.com/docview/1558846583 https://www.proquest.com/docview/1620074908 |
| Volume | 8 |
| WOSCitedRecordID | wos000335178600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1751-8717 dateEnd: 20140930 omitProxy: false ssIdentifier: ssj0056509 issn: 1751-8709 databaseCode: K7- dateStart: 20100101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1751-8717 dateEnd: 20140930 omitProxy: false ssIdentifier: ssj0056509 issn: 1751-8709 databaseCode: M7S dateStart: 20100101 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest advanced technologies & aerospace journals customDbUrl: eissn: 1751-8717 dateEnd: 20140930 omitProxy: false ssIdentifier: ssj0056509 issn: 1751-8709 databaseCode: P5Z dateStart: 20100101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1751-8717 dateEnd: 20140930 omitProxy: false ssIdentifier: ssj0056509 issn: 1751-8709 databaseCode: BENPR dateStart: 20100101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 1751-8717 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0056509 issn: 1751-8709 databaseCode: WIN dateStart: 20130101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-8717 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0056509 issn: 1751-8709 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1RT9swED6twAMvgzEQHazK0LSHSRZJEzfOExqoFdWkqlqZQHuxnLMjRUJpoYXfz13qdPSlPPASKfE5Ofls3-Xu_B3Ad4wN47IZ4TAsRCLDUGQmCYXMGX0_LhTmy2IT6Wik7u6ysXe4zX1aZbMn1hu1nSL7yM9J7ynSlVLFF7MHwVWjOLrqS2i0YJuRymieb1_2R-M_zV4smY_6SKSMaN2H2SqumZ2XbiHKghG72R0Yq2hNM7Woec3ofG261rpnsPdervfho7c6g1_LafIJPrjqAPaaig6BX-CfIfQo1OXc2QB5n6ZW6xZ1vlYVmMoGpfX5RbVID-HvoH9zdS18TQWBDAsppFMOrXGZKzDJUCo-O0t6O3UxmSquS0QYRbmUhbVFL6cfspSMMrQqKqRh-Lcj2KqmlTuGQOaRMiayqFJMZJpnyiqDKRmcSFo_L9oQNuOp0QOOc92Le10HvpNM0xhrEoFmEWgWQRt-rrrMlmgbm4h_8DO_5uabCM_WCIf9Gz0cTP4T6Jklbk8bCb565Up8bfi2aqYFyFEVU7npE9H02N3L8dM2xPUkeZt1PZz0u5ec2Nnrftn84RPYpW7JMsfyFLYWj0_uK-zg86KcP3ag1U3GHT_r6e53Kjqcvjqh61j-o-vtcPQCg_sJZg |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB61KRJcKE8RKGAQcEBa1a-N14cKUUhUqyWqaJB6265n15Il5IQmBfVP9Td2xo_QXMKpB67e8XrsGc_M7sx-A_AOI8O4bEY49AsRS98XqYl9IXNG348KhXnTbCIZj9XpaXq8AVfdWRguq-xsYm2o7RR5j3yX_J4iXylV9Gn2S3DXKM6udi00GrU4dJd_aMk238u-knzfh-FoOPlyINquAgIZGFFIpxxa41JXYJyiVHx6lDxX4iJy1i4kIgyCXMrC2mKQ05IkobAErQoKaRgAjebdhK04ImZ6sLU_HB9_72y_5Peuj2DKgOyMny7zqOlu6RaiLBghnLcfIxWseMJNGl4Jcm-GyrWvG23_b1_pAdxvo2rvc_MbPIQNVz2C7a5jhdcasMfgtyjb5dxZD9kP0ah1i7oerfJMZb3StvVTtco-gR-3wvdT6FXTyj0DT-aBMiawqBKMZZKnyiqDCQXUSFFNXvTB7-SnsQVU574eP3Wd2I9TTTLVJHLNItcs8j58XN4ya9BE1hF_4GutTZmvI3y7QpgNJzobnfwl0DNL3O50GnNjyqW69OHNcpgMDGeNTOWmF0Qz4O1szg_3IaqV8t-s6-xkGO5z4eogfL7-wa_h7sHk25E-ysaHL-AeTRE39aQ70FucX7iXcAd_L8r5-av2X_Pg7LYV9xpJ62Af |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB61BSEulKcIFDAIOCCt4tfG6wNCQBNhFUWRWqSKy3Y9uytZQk5oUhB_jV_HjB-huYRTD1y94_XKM55vvDP7DcBLTAzzshnhMPQilWEocpOGQpbMvp94hWXbbCKbTtXpaT7bgd_9WRguq-x9YuOo7Rx5j3xIuKcIK6VKhr4ri5gdTt4tvgvuIMWZ1r6dRmsiR-7XT_p9W74tDknXr-J4Mj75-El0HQYEMkmikE45tMblzmOao1R8kpRQLHMJAbeLSQijqJTSW-tHJf2eZBSioFWRl4bJ0GjeXbiWpSPF5WQz-bVHAclvoDmMKSPyOGG-zqjmw8qtROWZK5w3IhMVbWDiLg1vhLuXg-YG9Sb7__P7ug23ulg7eN9-HHdgx9V3Yb_vYxF0bu0ehB33drV0NkBGJxq1btVUqdWBqW1Q2a6qqjHk-_DlStb9APbqee0eQiDLSBkTWVQZpjIrc2WVwYzCbKRYp_QDCHtdauxo1rnbxzfdpPvTXJN-Nalfs_o1q38Ab9a3LFqOkW3Cr_la52mW2wRfbAgW4xNdTI7_CuiFpdUe9NZzacq16Qzg-XqY3A7nkkzt5hckM-JNbs4aDyBpDPTfS9fF8Tj-wOWso_jR9gc_gxtkrfpzMT16DDdphrQtMj2AvdX5hXsC1_HHqlqeP20-ugDOrtpq_wCuUGe0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generalised+cheater+detection+and+identification&rft.jtitle=IET+information+security&rft.au=Harn%2C+Lein&rft.date=2014-05-01&rft.issn=1751-8709&rft.eissn=1751-8717&rft.volume=8&rft.issue=3&rft.spage=171&rft.epage=171&rft_id=info:doi/10.1049%2Fiet-ifs.2012.0381&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8709&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8709&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8709&client=summon |