期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
(t,n)阈方案的欺诈识别 被引量:13
1
作者 谭凯军 诸鸿文 顾尚杰 《计算机研究与发展》 EI CSCD 北大核心 1999年第7期853-858,共6页
(t,n)阈方案中的欺诈识别是一个很重要的问题.文中提出了一种有效的基于平方剩余的欺诈识别方案,攻击时的难度相当于分解两个大素数的乘积的难度.它无须使用单向哈希函数,并且对公共参数的完整性给予保证,可以阻止阴谋者起诉... (t,n)阈方案中的欺诈识别是一个很重要的问题.文中提出了一种有效的基于平方剩余的欺诈识别方案,攻击时的难度相当于分解两个大素数的乘积的难度.它无须使用单向哈希函数,并且对公共参数的完整性给予保证,可以阻止阴谋者起诉陷害某个特殊的成员.它很容易扩展到分享多个秘密的情况.它所需的通信量较Chang-Hwang方案小. 展开更多
关键词 欺诈识别 阈方案 平方剩余 信息安全
下载PDF
一种新的秘密分享方案
2
作者 杜红珍 张建中 杨建宏 《济南大学学报(自然科学版)》 CAS 2005年第3期250-251,共2页
基于有限域上离散对数难解问题提出一种新的动态多秘密分享方案,方案构成简单,容易检测秘密分享成员的欺诈,能够解决秘密更新与复用问题,且可以很方便灵活地增删系统成员。整个方案安全性高、涉及计算复杂度小、需保存信息量少,因而效... 基于有限域上离散对数难解问题提出一种新的动态多秘密分享方案,方案构成简单,容易检测秘密分享成员的欺诈,能够解决秘密更新与复用问题,且可以很方便灵活地增删系统成员。整个方案安全性高、涉及计算复杂度小、需保存信息量少,因而效率较高。 展开更多
关键词 秘密分享 子秘密 HASH函数 阈方案
下载PDF
一种新的秘密分享方案
3
作者 杜红珍 张建中 《淮海工学院学报(自然科学版)》 CAS 2005年第2期1-3,共3页
基于有限域上离散对数问题提出了一种动态多秘密分享方案。本方案构成简单,容易检测秘密分享成员的欺诈,能够解决秘密更新与复用问题,且可以很方便地增删系统成员。整个方案安全性高、涉及计算复杂度小、需保存信息少,因而效率较高。
关键词 秘密分享 HASH函数 阈方案
下载PDF
新的动态多秘密分享方案
4
作者 杜红珍 张建中 《江汉大学学报(自然科学版)》 2005年第3期67-69,共3页
基于单向函数和有限域上离散对数问题提出一种动态多秘密分享方案.本方案构成简便,容易检测秘密分享成员的欺诈行为,能够解决秘密更新与复用的问题,且可以很方便地增加和删除系统成员.整个方案安全性高,涉及计算复杂度小,需保存信息少,... 基于单向函数和有限域上离散对数问题提出一种动态多秘密分享方案.本方案构成简便,容易检测秘密分享成员的欺诈行为,能够解决秘密更新与复用的问题,且可以很方便地增加和删除系统成员.整个方案安全性高,涉及计算复杂度小,需保存信息少,因而效率高且实用。 展开更多
关键词 秘密分享 子秘密 HASH函数 阈方案
下载PDF
基于单向函数的动态秘密分享 被引量:3
5
作者 谭凯军 诸鸿文 《计算机工程与应用》 CSCD 北大核心 1999年第7期46-47,共2页
文章提出了一种基于单向函数的动态秘密分享方案,它可以无限次地更新秘密,而成员所拥有的分享值却无须改变,还可以检测出不诚实的成员,并且所需的存储量和计算量都比Sun-Shieh[7]方案有了降低。
关键词 阈方案 动态秘密分享 单各函数 信息安全
下载PDF
A Verifiable Multi-Secret Sharing Scheme Based on Hermite Interpolation
6
作者 Tomoko Adachi Chie Okazaki 《Journal of Mathematics and System Science》 2014年第9期587-592,共6页
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key... A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation. 展开更多
关键词 Verifiable secret sharing scheme Multi-secret sharing scheme Hermite interpolation
下载PDF
Angle-Threshold Random Beamforming Scheme for Multi-Antenna System
7
作者 HU Hao LIU Xiaomin YANG Hongwen 《China Communications》 SCIE CSCD 2015年第1期1-10,共10页
Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedba... Codebook-based multiple input multiple output(MIMO) beamforming can significantly improve the system spectral efficiency with limited feedback and gets widely adopted.However,this scheme has a drawback of heavy feedback load that the sum feedback rate can be a bottleneck for the communication system,especially when the number of users is large.In this paper,a new scheme using pseudo-random beamforming vectors and angle based threshold in the feedback process is proposed.In the proposed scheme,both the base-station and the users have no need to store a codebook.In each access procedure,the base-station generates a pseudo-random beamforming vector,and each user calculates the angle between the beamforming vectors and its channel state information(CSI) vector.If the angle is less than a predefined angle-threshold,the user feeds back its channel quality indicators(CQI),otherwise it keep silence.Compared with the codebook based scheme,the proposed scheme can largely reduce the sum feedback rate with negligible throughput loss.In particular,when the system has a constraint on the total sum feedback rate in uplink channel,the proposed scheme can increase the system throughput significantly. 展开更多
关键词 BEAMFORMING feedback load system throughput random code anglethreshold.
下载PDF
THRESHOLD SCHEMES WITH WEIGHTS 被引量:5
8
作者 XIAOLiangliang LIUMulan 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2004年第4期578-581,共4页
In this paper, we present the model of threshold schemes with weights as a natural generalization of Shamir's threshold scheme and show how to apply the model to construct secret sharing schemes by two examples.
关键词 secrete sharing schemes threshold scheme WEIGHT
原文传递
Democratic Group Signatures with Threshold Traceability
9
作者 李祥学 钱海峰 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期98-101,共4页
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a... This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members. 展开更多
关键词 democratic group signature (DGS) ANONYMITY TRACEABILITY threshold traceability
原文传递
Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication 被引量:1
10
作者 赖红 Orgun A.Mehmet +2 位作者 肖井华 Pieprzyk Josef 薛理银 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第4期459-465,共7页
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised... In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. 展开更多
关键词 (2 3) threshold quantum state sharing RECURRENCE distributed fountain codes EFFICIENCY Trojan horse attacks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部