期刊文献+

Linear Secret Sharing Schemes and Rearrangements of Access Structures 被引量:5

Linear Secret Sharing Schemes and Rearrangements of Access Structures
原文传递
导出
摘要 In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice.
出处 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2004年第4期685-694,共10页 应用数学学报(英文版)
关键词 Access structure linear secret sharing scheme monotone span program rearrangement of access structure Access structure linear secret sharing scheme monotone span program rearrangement of access structure
  • 相关文献

参考文献5

  • 1Beimel, A. Secure schemes for secret sharing and key distribution. PhD thesis, Technion - Israel Institute of Techonlogy, 1996
  • 2Blackley, G.R. Safeguarding cryptographic keys. In R. E. Merwin, J.T. Zanca, and M. Smith, editors,In: Proc. of the 1979 AFIPS National Computer Conference, Vol.48 of AFIPS Conference proceedings,313-317. AFIPS Press, 1979
  • 3Ito, M., Saito, A., Nishizeki, T. Secret sharing schemes realizing general access structure. In: Proc. of the IEEE Global Telecommunication Conf., Globecom 87, 99-102, 1987 Journal version: Multiple Assignment Scheme for Sharing Secret. J. of Cryptology, 6(1): 15-20 1993
  • 4Shamir, A. How to share a secret. Communications of the ACM, 22:612-613 (1979)
  • 5Simmons, G.J. Contemporary Cryptology - The Science of Information Integrity, 1992

同被引文献24

  • 1张志芳.乘性单调张成方案[J].中国科学院研究生院学报,2006,23(6):827-832. 被引量:2
  • 2刘木兰.密钥共享体制与安全多方计算[J].北京电子科技学院学报,2006,14(4):1-8. 被引量:4
  • 3[1]Shamir.How to share a secret[J].Communications of the ACM,1979,22:612-613.
  • 4[2]G.R.Blakley.Safeguarding cryptographic keys[A].the 1979 AFIPS National Computer Conference[C].1979,48:313-317.
  • 5[3]M.Ito,A.Saito and T.Nishizeki.Secret sharing schemes realizing general access structure[A].Proc.of the IEEE Global Telecommunication Conf.,Globecom 87[C].1987,99-102.
  • 6[4]A.Beimel.Secure Schemes for Secret Sharing and Key Distribution[D].PhD thesis,Technion -Israel Institute of Techonlogy,1996.
  • 7[6]Zhifang Zhang,Mulan Liu,Liangliang Xiao.Rearrangements of access structures and their realizations in secret sharing schemes,to appear in Discrete Mathematics.
  • 8[7]J.Cohen Benaloh.Secret sharing homomorphisms:keeping shares of a secret secret[A].In Advances in Cryptology-CRYPTO' 86.
  • 9[8]R.Cramer,S.Fehr.Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups[A].Crypto 2002[C],LNCS 2442,pp.272-287.
  • 10[9]Ivan Damgard,Rune Thorbek.Linear integer secret sharing and distributed exponentiation[A].PKC2006[C],LNCS 3985,pp.75-90.

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部