期刊文献+

基于特殊权限的另一门限秘密共享方案 被引量:1

Another threshold secret sharing scheme based on special access right
下载PDF
导出
摘要 在秘密共享方案中,一般研究(n,t)门限秘密共享方案。具有特殊权限的(m+n,t+1)门限秘密共享方案是(n,t)门限秘密共享方案推广形式的门限秘密共享方案。在差分门限秘密共享方案的基础上构造基于Shamir方案,给出了(m+n,t+1)门限秘密共享的另一方案。 In secret sharing,generally,we just research on (n,t) secret sharing scheme.Based on special access right (m+n,t+1) threshold secret sharing is an generalized scheme of(n,t) secret sharing,and we will give another(m+n,t+1) threshold secret sharing scheme based on Shamir scheme under special access right.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第20期143-144,共2页 Computer Engineering and Applications
基金 国家重点基础研究发展规划(973)(the National Grand Fundam ental Research 973 Program of China under Grant No.2004CB318000)
关键词 秘密共享方案 特殊权限 门限秘密共享方案 secret sharing scheme special access right threshold secret sharing
  • 相关文献

参考文献7

  • 1Blakey G R.Safeguarding cryptographic Keys[C]//Proc NCC.Montvale:AFIPS Press,1979,48:313-317.
  • 2Josep Rifà-Coma.How to avoid the cheaters succeeding in the key sharing scheme[J].Designs,Codes and Cryptography,1993,3 (3):221-228.
  • 3李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20
  • 4Karnin E D,Greene J W,Hellman M E.On sharing secret systems[J].IEEE Transactions on Information Theory,1983,29(1):35-41.
  • 5Shamir A.How to share a secret[J].Comm ACM,1979,22:612-613.
  • 6Tan K,Chu H.General secret sharing scheme[J].Computer Communications,1999,22:755-757.
  • 7黄东平,王华勇,黄连生,戴一奇.动态门限秘密共享方案[J].清华大学学报(自然科学版),2006,46(1):102-105. 被引量:21

二级参考文献16

  • 1karnin E D,Green J W,Hellman M E.On Sharing Secret Systems [J].IEEE Transactions on Information Theory,1983,29(1):35-41.
  • 2Rifa-Coma J.How to Avoid the Cheaters Succeeding in the Key Sharing Scheme.Designs [J].Codes and Cryptography,1993,3(3):221-228.
  • 3Benaloh J C.Secret Sharing Hornomorphisrns [J].Keeping Shares of a Secret,Advances in Cryptology-CRYPTO'86,1987:251 - 260.
  • 4Shamir A.How to Share a Secret[J].Communications of theACM,1979,22(11):612-613.
  • 5Blakley G R.Safeguarding Cryptographic Keys.In:Proceedings of the National Computer Conference [J].AFIPS,1979,48:313-317.
  • 6Stinson D R.Cryptography:Theory and Practice [M].Boca Raton:CRC Press,Inc,1995.
  • 7Ito M,Saito A.T.Nishizeki Secret Sharing Scheme Realizing General Access Structure [M].Proc.IEEE Global Telecommunication Conf.Globecom 87,1987,99 - 102.
  • 8Feldman P.A ractical Scheme for Non-interactive Verifiable Secret Sharing [J].In:Proc.28th IEEE Symposium on Foundations of Computer Sciences (FOCS'87).Los Angeles:IEEE Computer Society,1987,427- 437.
  • 9Pedersen T P.No-interactive and Information-theoretic Secure Verifiable Secret Sharing [J].In:Feigenbaum J,et al.Advances in Cryptology-Crypto'91 Proceedings,LNCS 576.Berlin:Springer-Verlag,1992,129-140.
  • 10Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.

共引文献38

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部