期刊文献+

THRESHOLD SCHEMES WITH WEIGHTS 被引量:5

THRESHOLD SCHEMES WITH WEIGHTS
原文传递
导出
摘要 In this paper, we present the model of threshold schemes with weights as a natural generalization of Shamir's threshold scheme and show how to apply the model to construct secret sharing schemes by two examples.
出处 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2004年第4期578-581,共4页 系统科学与复杂性学报(英文版)
基金 This research is supported by the National Natural Science Foundation of China (Nos. 6008302, 90304012).
关键词 secrete sharing schemes threshold scheme WEIGHT 秘密共享方案 阈值方案 加权 线性空间
  • 相关文献

参考文献4

  • 1G. R. Blazkley, Safeguarding cryptographic keys, Proc. of the 1979 AFIPS National Computer Conference, 1979, 48: 313-317.
  • 2A. Shamir, How to share a secret, Communications of the ACM, 1979, 22: 612-613.
  • 3A. Beimel, Secure Schemes for Secret Sharing and Key Distribution, P'hD thesis, Technion-Israel Institute of Techonlogy, 1996.
  • 4Simmons, Contemporary Cryptology: The Science of Information Integrity, IEEE Press, New York,1992.

同被引文献36

  • 1李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20
  • 2Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 3Blakley G R.Safeguarding cryptographic keys[C]//AFIPS Conference Proceedings.New Jersy:AFIPS Press,1979:313-317.
  • 4McEliece R J,Sarwate D V.On sharing secrets and Reed-Solomon codes[J].Communications of the ACM,1981,24(3):583-584.
  • 5Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
  • 6Karnin E D,Green J W,Hellman M E.On sharing secret systems[J].IEEE Transactions on Information Theory,1983,29(1):35-41.
  • 7Li B.Difference secret sharing scheme based on special access right[J].Journal of Sichuan University(NSE),2006,43(1):78-83.
  • 8Dehkordi M H,Mashhadi S.New efficient and practical verifiable multi-secret sharing schemes[J].Information Science,2008,9 (178):2262-2274.
  • 9Nojoumian M,Stinson D H,Grainger M.Unconditionally secure social secret sharing scheme[J].IET Information Security,2010,4(2):202-211.
  • 10Nojoumian M,Stinson D R.On dealer-free dynamic threshold schemes[J].Advances in Mathematics of Communications,2013,7(1):39-56.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部