期刊文献+

一种在秘密共享中骗子的检测方案

Cheater identification in threshold scheme
下载PDF
导出
摘要 提出了一种能正确确定欺骗者的方案。此方案具有在验证时运算简单、快速的特点。对此方案的攻击如同大数分解一样困难。 A scheme can detection cheater correctly is proposed. The quantity of the scheme is detection and cheater identification efficient and simple. The attack is as difficult as factoring the product of large numbers.
出处 《通信学报》 EI CSCD 北大核心 2005年第12期136-139,共4页 Journal on Communications
关键词 骗子检测 秘密共享 二次剩余 门限方案 cheater detection share secret quadratic residues threshold scheme
  • 相关文献

参考文献14

  • 1SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2BLAKLEY G R.Safeguarding cryptographic keys[A].Proceedings of the AFIPS 1979 National Computer Conference[C].1979.313-317.
  • 3TOMPA M,WOLL H.How to share a secret with cheaters[J].J Crypt 1988:133-139.
  • 4BRICKELL E F,STINTON D R.The dectection of cheaters in threshold schemes[A].Advances in Cryptolygy-Crypto'88[C].Berlin,Heidelberg:Springer,1988.2017-2018.
  • 5SU H M,SHIEH S P.Construction of dynamic threshold schemes[J].Electron Lett,1994.30(24):2023-2024.
  • 6WU T C,WU T S.Cheating detection and cheater indentification in secret sharing schemes[J].IEE Peoc E Comput Digit Tech,1995,142(5):367-369.
  • 7HWANG S J,CHANG C C,YANG W P.New Cheater Indentification in Shtrshold Schemes[R].Technical Report of the Institute of Computer and Information Science,National Chiao Tung University,Hsinchu,Taiwan,1995.
  • 8CHANG C C,Hwang R J.Efficient cheater identification method for threshold schemes[J].IEE Peoc E Comput Digit Tech,1997,144(1):23-27.
  • 9TAN K J,ZHU H W,GU S J.Cheater identification in(t,n)threshold scheme[J].Computer Communications,1999,22:762-765.
  • 10CHIOU G H,CHEN W T.Secure broadcasting using the secure lock[J].IEEE Transactions on Software Engineering,1989,15:929-934.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部