期刊文献+
共找到727篇文章
< 1 2 37 >
每页显示 20 50 100
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
1
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
下载PDF
A Summary of the Large-Scale Access Convergence Network Structure
2
作者 LAN Julong ZHANG Xiaohui +5 位作者 SHEN Juan HU Yuxiang WANG Xiang MAO Zhenshan WANG Lingqiang LIANG Dong 《China Communications》 SCIE CSCD 2016年第S1期1-5,共5页
Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified mult... Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified multi-service bearing in the IP network, the largescale access convergence network architecture is proposed. This flat access convergence structure with ultra-small hops, which shortens the service transmission path, reduces the complexity of the edge of the network, and achieves IP strong waist model with the integration of computation, storage and transmission. The key technologies are also introduced in this paper, including endto-end performance guarantee for real time interactive services, fog storing mechanism, and built-in safety transmission with integration of aggregation and control. 展开更多
关键词 network architecture LARGE-SCALE access CONVERGENCE flat structure ultra-small HOPS
下载PDF
Design and Implementation of Memory Access Fast Switching Structure in Cluster-Based Reconfigurable Array Processor
3
作者 Rui Shan Lin Jiang +2 位作者 Junyong Deng Xueting Li Xubang Shen 《Journal of Beijing Institute of Technology》 EI CAS 2017年第4期494-504,共11页
Memory access fast switching structures in cluster are studied,and three kinds of fast switching structures( FS,LR2 SS,and LAPS) are proposed. A mixed simulation test bench is constructed and used for statistic of d... Memory access fast switching structures in cluster are studied,and three kinds of fast switching structures( FS,LR2 SS,and LAPS) are proposed. A mixed simulation test bench is constructed and used for statistic of data access delay among these three structures in various cases. Finally these structures are realized on Xilinx FPGA development board and DCT,FFT,SAD,IME,FME,and de-blocking filtering algorithms are mapped onto the structures. Compared with available architectures,our proposed structures have lower data access delay and lower area. 展开更多
关键词 array processor distributed memory memory access switching structure
下载PDF
A Group Oriented Cryptosystem for the Vector Space Access Structure
4
作者 许春香 马华 +1 位作者 周军会 肖国铮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期184-187,共4页
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr... A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it. 展开更多
关键词 group oriented cryptosystems sell-certified public keys vector space access structure
下载PDF
Study of the impacts of upstream natural gas market reform in China on infrastructure deployment and social welfare using an SVM-based rolling horizon stochastic game analysis 被引量:3
5
作者 Yan Li Ge Wang +2 位作者 Benjamin Mclellan Si-Yuan Chen Qi Zhang 《Petroleum Science》 SCIE CAS CSCD 2018年第4期898-911,共14页
Natural gas is expected to play a much more important role in China in future decades, and market reform is crucial for its rapid market penetration. At present, the main gas fields, pipelines and liquefied natural ga... Natural gas is expected to play a much more important role in China in future decades, and market reform is crucial for its rapid market penetration. At present, the main gas fields, pipelines and liquefied natural gas(LNG) infrastructure are mainly monopolized by large state-owned companies, and one of the important market reform policies is to open up LNG import rights to smaller private companies and traders. Therefore, in the present study, a game theoretical model is proposed to analyze and compare the impacts of different market structures on infrastructure deployment and social welfare. Moreover, a support vector machine-based rolling horizon stochastic method is adopted in the model to simulate real LNG price fluctuations. Four market reform scenarios are proposed considering different policies such as business separation, third-party access(TPA) and their combinations. The results indicate that, with third-party access(TPA)entrance into the LNG market, the construction of LNG infrastructure will be promoted and more gas will be provided at lower prices, and thus the total social welfare will be improved greatly. 展开更多
关键词 LNG market reform Market structure Third-party access Rolling horizon stochastic method Game theory
下载PDF
Mem Brain: An Easy-to-Use Online Webserver for Transmembrane Protein Structure Prediction 被引量:3
6
作者 Xi Yin Jing Yang +2 位作者 Feng Xiao Yang Yang Hong-Bin Shen 《Nano-Micro Letters》 SCIE EI CAS 2018年第1期12-19,共8页
Membrane proteins are an important kind of proteins embedded in the membranes of cells and play crucial roles in living organisms, such as ion channels,transporters, receptors. Because it is difficult to determinate t... Membrane proteins are an important kind of proteins embedded in the membranes of cells and play crucial roles in living organisms, such as ion channels,transporters, receptors. Because it is difficult to determinate the membrane protein's structure by wet-lab experiments,accurate and fast amino acid sequence-based computational methods are highly desired. In this paper, we report an online prediction tool called Mem Brain, whose input is the amino acid sequence. Mem Brain consists of specialized modules for predicting transmembrane helices, residue–residue contacts and relative accessible surface area of a-helical membrane proteins. Mem Brain achieves aprediction accuracy of 97.9% of ATMH, 87.1% of AP,3.2 ± 3.0 of N-score, 3.1 ± 2.8 of C-score. Mem BrainContact obtains 62%/64.1% prediction accuracy on training and independent dataset on top L/5 contact prediction,respectively. And Mem Brain-Rasa achieves Pearson correlation coefficient of 0.733 and its mean absolute error of13.593. These prediction results provide valuable hints for revealing the structure and function of membrane proteins.Mem Brain web server is free for academic use and available at www.csbio.sjtu.edu.cn/bioinf/Mem Brain/. 展开更多
关键词 Transmembrane a-helices structure prediction Machine learning Contact map prediction Relative accessible surface area
下载PDF
Analysis of the Spatial Structure of Tourism Resources in Ji'an City 被引量:2
7
作者 ZHU Jian SONG Juan 《Journal of Landscape Research》 2013年第Z3期35-38,共4页
This paper analyzed characteristics of tourism resources in Ji'an City,and carried out quantitative analysis of local tourism resources based on agglomeration effect of resources,connectivity analysis,and accessib... This paper analyzed characteristics of tourism resources in Ji'an City,and carried out quantitative analysis of local tourism resources based on agglomeration effect of resources,connectivity analysis,and accessibility analysis. The results showed that the city has poor loop of tourism network,major scenic areas(spots) have moderate network accessibility,in view of this,suggestions for the optimum development of local tourism industry were proposed. 展开更多
关键词 Ji’an CITY TOURISM resources Spatial structure AGGLOMERATION effect CONNECTIVITY ANALYSIS accessIBILITY ANALYSIS
下载PDF
Examples for Application of Gravitational Model in the Investigation of Spatial Structure
8
作者 Aron Kincses Geza Toth 《Journal of Mathematics and System Science》 2013年第10期477-490,共14页
In this paper the authors wish to introduce an application of the gravitational model through two concrete examples. In their investigation the gravitational model was transformed to analyze the spatial structure of E... In this paper the authors wish to introduce an application of the gravitational model through two concrete examples. In their investigation the gravitational model was transformed to analyze the spatial structure of Europe, and the impact of accessibility in Hungary. In this analysis not only the size of gravitational forces but their direction can also be measured. Displacements were illustrated by a bi-dimensional regression, which gives a new perspective to the investigation of spatial structure. 展开更多
关键词 Gravitational model bi-dimensional regression accessIBILITY spatial structure EUROPE Hungary.
下载PDF
Tunable Super-Structured Fiber Bragg Gratings with Perfect Sequences Based on m-Sequence
9
作者 Joao S.Pereira Marco P.M.Ferreira Marko Gasparovic 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第4期358-363,共6页
Recently, a tunable fiber Bragg grating(FBG) was developed by using stress-responsive colloidal crystals. In this paper, we have simulated the application of these nanoparticles into the super-structured fiber Bragg g... Recently, a tunable fiber Bragg grating(FBG) was developed by using stress-responsive colloidal crystals. In this paper, we have simulated the application of these nanoparticles into the super-structured fiber Bragg grating(SSFBG) written with perfect sequences derived from a short maximal-length sequence. A tunable SSFBG will be available to overcome the prohibitive temperature variation of the optical codecs. Nevertheless,we presented a method to implement coherent time spreading optical code-division multiple-access(OCDMA) where a unique code(or perfect sequence) can be reused and mixed with different wavelengths to obtain a tunable wavelength-division multiplexing(WDM)system. In order to maximize the binary throughput, we have selected a unique short maximal-length sequence composed of 7 chips that can be tuned with 7 different optical wavelengths. We found thousands of different tunable combinations that presented power contrast ratios(P/C) higher than 12 dB. When a WDM-OCDMA system used 2 different combinations simultaneously, the perfect binary detection with error correction codes was achieved successfully. The tunable SSFBG with colloidal crystals will be a simple and good alternative choice for fiber-to-the-home(FTTH) communications. 展开更多
关键词 Optical code-division multiple-access(OCDMA) super-structured fiber Bragg grating(SSFBG) wavelength-division multiplexing OCDMA(WDM-OCDMA)
下载PDF
Sequence based prediction of relative solvent accessibility using two-stage support vector regression with confidence values
10
作者 Ke Chen Michal Kurgan Lukasz Kurgan 《Journal of Biomedical Science and Engineering》 2008年第1期1-9,共9页
Predicted relative solvent accessibility (RSA) provides useful information for prediction of binding sites and reconstruction of the 3D-structure based on a protein sequence. Recent years observed development of sever... Predicted relative solvent accessibility (RSA) provides useful information for prediction of binding sites and reconstruction of the 3D-structure based on a protein sequence. Recent years observed development of several RSA prediction methods including those that generate real values and those that predict discrete states (buried vs. exposed). We propose a novel method for real value prediction that aims at minimizing the prediction error when compared with six existing methods. The proposed method is based on a two-stage Support Vector Regression (SVR) predictor. The improved prediction quality is a result of the developed composite sequence representation, which includes a custom-selected subset of features from the PSI-BLAST profile, secondary structure predicted with PSI-PRED, and binary code that indicates position of a given residue with respect to sequence termini. Cross validation tests on a benchmark dataset show that our method achieves 14.3 mean absolute error and 0.68 correlation. We also propose a confidence value that is associated with each predicted RSA values. The confidence is computed based on the difference in predictions from the two-stage SVR and a second two-stage Linear Regression (LR) predictor. The confidence values can be used to indicate the quality of the output RSA predictions. 展开更多
关键词 RELATIVE SOLVENT accessIBILITY support vector regression PSI-BLAST PSI-PRED SECONDARY protein structure
下载PDF
Non-cooperative game for network access selection in heterogeneous integrated networks
11
作者 郭洪尧 Zhang Xin +2 位作者 He Yunlu Jiang Rui Xie Jiangbo 《High Technology Letters》 EI CAS 2014年第3期282-287,共6页
The integration of different heterogeneous access networks is one of the remarkable characteristics of the next generation network,in which users with multi-network interface terminals can independently select access ... The integration of different heterogeneous access networks is one of the remarkable characteristics of the next generation network,in which users with multi-network interface terminals can independently select access network to obtain the most desired service.A kind of unified quantification model of non-monotone quality of service(QoS) and a model of non-cooperative game between users and networks are proposed for heterogeneous network access selection.An optimal network pricing mechanism could be formulated by using a novel strategy which is used in this non-cooperative game model to balance the interests of both the users and the networks.This access network selection mechanism could select the most suitable network for users,and it also could provide the basis when formulating QoS standards in heterogeneous integrated networks.The simulation results show that this network selection decision-making algorithm can meet the users' demand for different levels service in different scenes and it can also avoid network congestion caused by unbalanced load. 展开更多
关键词 heterogeneous network integration access selection non-cooperative game non-monotone quality of service (QoS)
下载PDF
经桡动脉入路在神经介入手术中应用的思考 被引量:1
12
作者 刘斌 李智 杨志刚 《中国临床医学》 2024年第1期12-16,共5页
经桡动脉入路在神经介入治疗领域越来越受到重视,其具有并发症少,满意度高等优点,但存在学习曲线长、受到桡动脉及上肩部解剖因素限制、专用器械缺乏等缺点及难点。经桡动脉入路很少存在绝对禁忌证,远端及左侧桡动脉入路也逐渐作为入路... 经桡动脉入路在神经介入治疗领域越来越受到重视,其具有并发症少,满意度高等优点,但存在学习曲线长、受到桡动脉及上肩部解剖因素限制、专用器械缺乏等缺点及难点。经桡动脉入路很少存在绝对禁忌证,远端及左侧桡动脉入路也逐渐作为入路选择,而通过无鞘经桡动脉入路或更大内腔的桡动脉鞘及器材组合,可以更广泛地开展各种神经介入手术。但在目前缺乏高级别证据的背景下,经桡动脉入路在颅内动脉瘤、颈动脉支架、机械取栓等神经介入治疗场景中仍存在一定困难及挑战,应用时更应权衡利弊。 展开更多
关键词 经桡动脉入路 神经介入治疗 解剖结构 冷思考
下载PDF
药品标签信息无障碍化的分析框架与问题发现
13
作者 张虹倩 胡范铸 《语言战略研究》 CSSCI 北大核心 2024年第4期23-33,共11页
2023年实施的《中华人民共和国无障碍环境建设法》,标志着中国的“无障碍改造”由面向残疾人和老年人向全人群“需要者”延伸,其中药品标签无障碍改造的规定即关涉全人群的用药安全。随机抽样选取100种日常家用药品,从药品标签的信息结... 2023年实施的《中华人民共和国无障碍环境建设法》,标志着中国的“无障碍改造”由面向残疾人和老年人向全人群“需要者”延伸,其中药品标签无障碍改造的规定即关涉全人群的用药安全。随机抽样选取100种日常家用药品,从药品标签的信息结构、语篇形式、符号模态3个角度考察、分析,发现在国家有关法规的不断推动下,中国药品标签的信息无障碍已普遍达到一定的水准,不过依然存在一系列问题有待改进:在信息结构上,需进一步突显“警示语”;在语篇结构上,应贯彻“消费者视角”的“重要性领先”原则,将适应症/功能主治、用法用量等最终消费者认为的最重要信息置于显著位置;在符号模态上,应进一步强化盲文意识和英文意识,更需要改善涉时间信息的无色钢印形式,以免给多数消费者造成识别障碍。由此,本文为语言学介入社会语言生活探索出一个基于言语行为的分析框架,即“信息结构的要素分布+语篇结构的排列方式+符号模态的形貌修辞”。 展开更多
关键词 信息无障碍 药品标签 信息结构 语篇形式 符号模态
下载PDF
预防与控制:能源市场准入制度因应“双碳”目标的法律机理
14
作者 张忠民 张琪 《重庆大学学报(社会科学版)》 CSSCI 北大核心 2024年第4期198-211,共14页
能源结构低碳化转型作为“双碳”目标推进的重要战略,需要一系列制度措施来促进“清洁用能”和“能源供给”兼备的能源结构格局之形成。市场机制是能源结构低碳化转型的主要驱动,而能源市场准入制度是发挥市场机制秩序稳定与风险防范作... 能源结构低碳化转型作为“双碳”目标推进的重要战略,需要一系列制度措施来促进“清洁用能”和“能源供给”兼备的能源结构格局之形成。市场机制是能源结构低碳化转型的主要驱动,而能源市场准入制度是发挥市场机制秩序稳定与风险防范作用的重要约束和规制工具。因此,能源结构低碳化转型须构建完善的能源市场准入制度予以落实。传统能源市场准入制度对低碳治理的规制存在局限,革新的能源市场准入制度应当体现出维护能源市场秩序与气候公共利益实现的双重价值追求,功能定位在“预防—控制”的二元结构。“预防—控制”的功能定位呼唤能源市场准入制度明确更为科学的立法导向,该制度的规范建构须分别在“碳源”阶段与“碳流”阶段实施不同的功能分配、资源整合与立法策略:前者聚焦于调适能源开发利用中传统化石能源、清洁能源与可再生能源的比例,促进能源结构的低碳升级;后者注重能源产业的资质准入与行为监督,在保障能源合理供给的基础上强化低碳治理。由此切入,能源市场准入制度的革新应当按照统一性与差异性相结合的原则,从能源供给与低碳控制两个层面归纳所涉制度要素并对之定性,进一步完善准入标准、许可事务、准入审批与后续监管等要素的规范形态,充实规范内容与程序结构,提升制度能力。具言之,一是以协调能源供给与低碳控制为原则,注重不同能源准入情景下需要何种强度的资格准入、规模准入、项目审查等标准的实践性指向,形成具备稳定性与定量性的准入标准;二是以“能源供给的必要性”和“碳风险程度”为划分标准,根据不同能源开采企业与加工转换企业的特性来识别差异化的运营需求与行为要求,进而厘定各类能源产业的许可条件设定与事务分配;三是以准入审批与后续监管并重的结构化联结为理念,构建以“准入事务与标准的履行能力”为中心的专项审查模式与以“能源供给与低碳控制的义务履行实效”为中心的后续监管模式,强化被准入主体的能源服务供给与低碳义务的履行。 展开更多
关键词 能源法 “双碳”目标 市场准入 能源结构 行政许可
下载PDF
基于结构-过程-结果模型的医用耗材准入管理及效果分析
15
作者 郭晓培 孙烈 谭艳芬 《医院管理论坛》 2024年第3期87-92,共6页
目的 评价结构-过程-结果模型在医院医用耗材准入管理中的应用与效果。方法 基于结构-过程-效果模型构建医院医用耗材准入管理体系,选取北京大学第一医院2020年7月—2022年12月准入的医用耗材作为研究对象,从组织结构、过程管理、结果... 目的 评价结构-过程-结果模型在医院医用耗材准入管理中的应用与效果。方法 基于结构-过程-效果模型构建医院医用耗材准入管理体系,选取北京大学第一医院2020年7月—2022年12月准入的医用耗材作为研究对象,从组织结构、过程管理、结果评价三个维度对耗材准入通过率、耗占比、不良事件发生率、医疗纠纷发生率进行结果评价。结果 医用耗材准入管理体系实施后,耗材准入通过率提高(p<0.05);部分科室耗占比明显下降(p<0.05);不良事件发生率下降、未发生因耗材引发的医疗纠纷。结论 结构-过程-效果模型在医用耗材准入管理中取得明显效果,初步实现了耗材准入管理的科学性、规范性、有效性。 展开更多
关键词 结构-过程-结果模型 医用耗材 准入管理
下载PDF
基于身份的跨域分层访问控制加密方案
16
作者 张应辉 李冬娟 +1 位作者 曹进 郑东 《密码学报(中英文)》 CSCD 北大核心 2024年第5期1062-1077,共16页
访问控制加密强制执行读写权限,它通过一个既不知道明文、发送者和接收者,也不知道访问控制策略的净化器,阻断所有不被允许的阈下信道.针对访问控制加密中密钥生成中心所面临的繁重的密钥管理负担,本文提出了基于身份的跨域分层访问控... 访问控制加密强制执行读写权限,它通过一个既不知道明文、发送者和接收者,也不知道访问控制策略的净化器,阻断所有不被允许的阈下信道.针对访问控制加密中密钥生成中心所面临的繁重的密钥管理负担,本文提出了基于身份的跨域分层访问控制加密方案.首先,在基于身份的分层广播加密方案的基础上提出了与聚合器兼容的净化的基于身份的分层广播加密方案,进一步结合结构保持签名、非交互式零知识证明和聚合器提出了一个跨域分层访问控制加密的通用构造.然后证明了通用构造的安全性,即满足无读和无写规则.此外,对通用构造进行了实例化,实现了半静态安全并且密文大小是恒定的.最后对实例化方案进行了性能分析,结果表明本方案在保证效率的同时实现了更加丰富的功能. 展开更多
关键词 访问控制加密 基于身份的分层广播加密 非交互式零知识证明 结构保持签名
下载PDF
基于“入径结构”的城市街区形态测度方法 被引量:1
17
作者 宋亚程 张烨 韩冬青 《城市规划》 CSSCI CSCD 北大核心 2024年第3期98-106,共9页
为了加强物质形态与行为活动的关联性分析,本文基于街道、场地和建筑三种形态要素之间的拓扑连接关系,提出量化表述城市街区形态特征的“入径结构”方法。建立了街区基本结构以及互锁、并合、套叠三种复杂结构类型的认知理念,基于图论... 为了加强物质形态与行为活动的关联性分析,本文基于街道、场地和建筑三种形态要素之间的拓扑连接关系,提出量化表述城市街区形态特征的“入径结构”方法。建立了街区基本结构以及互锁、并合、套叠三种复杂结构类型的认知理念,基于图论工具提出复杂性指标体系及其计算方法。以南京为例,通过分析高楼门街区的内部构成逻辑,以及不同时期的三个城市中心区的街区类型特征,验证了该方法在两个尺度上的实用性与有效性。为认知城市街区形态结构的内在组织逻辑提供了一种科学的测量方法,也为城市设计在微观层面的精细化和数字化发展建立了技术基础。 展开更多
关键词 城市街区 测量方法 复杂性 形态结构 入径结构
下载PDF
Linear Secret Sharing Schemes and Rearrangements of Access Structures 被引量:5
18
作者 Liang-liangXiao Mu-lanLiu 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2004年第4期685-694,共10页
In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions b... In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice. 展开更多
关键词 access structure linear secret sharing scheme monotone span program rearrangement of access structure
原文传递
The optimal information rate for graph access structures of nine participants 被引量:1
19
作者 Yun SONG Zhihui LI +1 位作者 Yongming LI Ren XIN 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第5期778-787,共10页
The information rate is an important metric of the performance of a secret-sharing scheme. In this paper we consider 272 non-isomorphic connected graph access structures with nine vertices and eight or nine edges, and... The information rate is an important metric of the performance of a secret-sharing scheme. In this paper we consider 272 non-isomorphic connected graph access structures with nine vertices and eight or nine edges, and either determine or bound the optimal information rate in each case. We obtain exact values for the optimal information rate for 231 cases and present a method that is able to derive information-theoretical upper bounds on the optimal information rate. Moreover, we apply some of the constructions to determine lower bounds on the information rate. Regarding information rate, we conclude with a full listing of the known optimal information rate (or bounds on the optimal information rate) for all 272 graphs access structures of nine participants. 展开更多
关键词 optimal information rate perfect secret-sharingscheme entropy method graph access structure splittingconstruction L-decomposition weighted decomposition
原文传递
THE OPTIMAL LINEAR SECRET SHARING SCHEME FOR ANY GIVEN ACCESS STRUCTURE 被引量:1
20
作者 TANG Chunming GAO Shuhong ZHANG Chengli 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2013年第4期634-649,共16页
Any linear code can be used to construct a linear secret sharing scheme.In this paper,it is shown how to decide optimal linear codes(i.e.,with the biggest information rate)realizing a given access structure over finit... Any linear code can be used to construct a linear secret sharing scheme.In this paper,it is shown how to decide optimal linear codes(i.e.,with the biggest information rate)realizing a given access structure over finite fields.It amounts to solving a system of quadratic equations constructed from the given access structure and the corresponding adversary structure.The system becomes a linear system for binary codes.An algorithm is also given for finding the adversary structure for any given access structure. 展开更多
关键词 access structure adversary structure CRYPTOGRAPHY linear code secret sharing.
原文传递
上一页 1 2 37 下一页 到第
使用帮助 返回顶部