Computer Science – Information Theory
Scientific paper
2008-11-06
Computer Science
Information Theory
2 pages. Submitted to the IEEE Transactions on Information Theory
Scientific paper
In this paper two cryptographic methods are introduced. In the first method
the presence of a certain size subgroup of persons can be checked for an action
to take place. For this we use fragments of Raptor codes delivered to the group
members. In the other method a selection of a subset of objects can be made
secret. Also, it can be proven afterwards, what the original selection was.
No associations
LandOfFree
Raptor Codes and Cryptographic Issues does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Raptor Codes and Cryptographic Issues, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Raptor Codes and Cryptographic Issues will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-630774