期刊文献+

门限秘密共享体制的一种防欺诈设计

Design to Identify Cheaters in the Threshold Secret Sharing Scheme
下载PDF
导出
摘要 文章给出了一种可以防止在门限秘密共享体制中发生的欺诈行为的方案,并分析了其防欺诈的性能。此方案是通过限制门限体制中的密钥空间而设计的,可操作性强,信息率高,是一个比较实用的秘密共享体制。 This paper proposes a threshold secret sharing scheme to identify cheaters, whose properties are analyzed in detail. The scheme is designed by imposing restriction on the set of secrets in a threshold secret sharing scheme. The scheme is efficient, practical and of higher information rate.
作者 刘弦 黄莉
出处 《信息工程大学学报》 2006年第4期333-335,共3页 Journal of Information Engineering University
关键词 秘密共享体制 欺诈概率 信息率 Secret sharing scheme Probability of cheating Optimal information rate
  • 相关文献

参考文献9

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Tompa M,Woll H.How to share a secret with cheaters[J].Journal of Cryptology,1988,19:133-138.
  • 3Ogata W,Kurosawa K.Optimum secret sharing scheme secure against cheating[C]//Lecture Notes in Computer Science.Berlin:Springer-Verlag,1996,1070:200-211.
  • 4Carpentieri R M,De Santis A.Vaccaro Ugo.Size of shares and probability of cheating in Threshold Schemes[C]//Proceedings of Eurocrypt'93,Lecture Notes in Computer Science,LNCS 765.1993:118-125.
  • 5Brickell E F,Stinson D R.The detection of cheaters in threshold schemes[J].SIAM J.on Discrete Math.,1991,4:502-510.
  • 6Carpentieri R M.A perfect threshold secret sharing scheme to identify cheaters[J].Designs,Codes and Cryptography,1995,5:183-187.
  • 7Kurosawa K,Obana S,Ogata W.T-Cheater Identifiable (k,n) Threshold Secret Sharing Schemes[C]//Lecture Notes in Computer Science.Berlin:Springer-Verlag,1995:410-423.
  • 8Padro C,Saez G,Villar J L.Detection of cheaters in vector space secret sharing schemes[J].Designs,Codes and Cryptography,1999,16:75-85.
  • 9Rifa Coma J.How to avoid cheaters succeeding in the key sharing scheme[J].Designs,Codes and Cryptography,1993,3:221-228.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部