In this paper, the limitations of the single cube D-optimal design scheme is studied, and a double cube D-optimal design scheme is suggested in order to overcome the limitations. For a sort of incomplete cubic polynom...In this paper, the limitations of the single cube D-optimal design scheme is studied, and a double cube D-optimal design scheme is suggested in order to overcome the limitations. For a sort of incomplete cubic polynomials, the test design of the identification is developed with this new scheme, and the comparation with the single cube scheme is also given. This scheme is shown to be perfectly suitable for the optimal identification of the complete cubic polynomials.展开更多
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h...A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.展开更多
文摘In this paper, the limitations of the single cube D-optimal design scheme is studied, and a double cube D-optimal design scheme is suggested in order to overcome the limitations. For a sort of incomplete cubic polynomials, the test design of the identification is developed with this new scheme, and the comparation with the single cube scheme is also given. This scheme is shown to be perfectly suitable for the optimal identification of the complete cubic polynomials.
文摘A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.