期刊文献+

An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters 被引量:1

An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters
原文传递
导出
摘要 In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others. In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第3期17-21,共5页 中国邮电高校学报(英文版)
基金 ThisworkissupportedbytheShaanxiNatureScienceFoundation (No.2 0 0 2A0 3)
关键词 secret sharing authentication codes threshold scheme CHEATING secret sharing authentication codes threshold scheme cheating
  • 相关文献

参考文献1

二级参考文献1

共引文献1

同被引文献11

  • 1何业锋,张建中.基于Diffie-Hellman密码体制可验证的动态秘密分享方案[J].陕西师范大学学报(自然科学版),2005,33(1):26-28. 被引量:6
  • 2李彦江,马传贵,黄刘生.一种电子投票方案[J].软件学报,2005,16(10):1805-1810. 被引量:7
  • 3夏静波,张四兰,陈建华.一个无收据的高效电子选举方案[J].武汉大学学报(理学版),2006,52(3):340-344. 被引量:3
  • 4张晓敏,张建中.基于ElGamal数字签名的零知识证明身份鉴别方案[J].计算机工程与应用,2006,42(34):131-132. 被引量:5
  • 5Chaum D. Untraceable electronic mail, return address, and digital pseudonyms [J]. Communication of ACM, 1981, 28(2): 84-88.
  • 6Fujiaka A, Okamoto T, Ohta K. A practical secret voting scheme .for large scale elections[C]//Seberry J, Zheng Y. Advances in Cryptology-AUSCRYPT' 92 Proceedings. New York.. Spring-Verlag, 1993:244-251.
  • 7Benaloh J, Tuinstra D. elections[C]//Goodrich M. Receipt-free secret-ballot Proceedings of 26th ACM Symposium on Theory of Computing (STOC'94). New York.. ACM Press, 1994:544-553.
  • 8Sako K, Killian J. Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth[C] //Guillou L C, Quisquater J J. Advances in Cryptology: Proceedings of EUROCRYPTO95. Berlin: Spring-Verlag, 1995: 393-403.
  • 9Rodriguez F, Daniel O A, Claudia G Z. Yet another improvement over the Mu-Varadharajan e-voting protocol[J]. Computer Standards & Interfaces, 2007, 29(2) : 471-480.
  • 10Lin I, Hwang M, Chang C. Security enhancement for anonymous secure e-voting over a network [J]. Computer Standards & Interfaces, 2003, 25 (2) : 131- 139.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部