咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 8 篇 网络空间安全
    • 4 篇 计算机科学与技术...
    • 2 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 12 篇 verifiable secre...
  • 2 篇 mobile agent
  • 2 篇 anonymous paymen...
  • 1 篇 participating me...
  • 1 篇 secret sharing
  • 1 篇 multi-authority
  • 1 篇 plane parameter ...
  • 1 篇 access control
  • 1 篇 commitment schem...
  • 1 篇 shared verificat...
  • 1 篇 secure multi-par...
  • 1 篇 information-theo...
  • 1 篇 unconditional se...
  • 1 篇 privacy-preservi...
  • 1 篇 threshold scheme
  • 1 篇 partial broadcas...
  • 1 篇 data aggregation
  • 1 篇 information rate
  • 1 篇 threshold
  • 1 篇 error detection

机构

  • 1 篇 school of comput...
  • 1 篇 nationalkeylabor...
  • 1 篇 school of mathem...
  • 1 篇 department of el...
  • 1 篇 shanghai key lab...
  • 1 篇 department of el...
  • 1 篇 national key lab...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 security researc...
  • 1 篇 college of compu...
  • 1 篇 school of softwa...
  • 1 篇 cyberspace secur...
  • 1 篇 state key labora...
  • 1 篇 school of contin...
  • 1 篇 school of electr...
  • 1 篇 college of compu...
  • 1 篇 state key labora...

作者

  • 1 篇 xiao guozhen
  • 1 篇 r. mohandas reng...
  • 1 篇 cai yongquan
  • 1 篇 luo shou-shan
  • 1 篇 liu yi xiang min...
  • 1 篇 zhang en
  • 1 篇 xiaopeng zhao
  • 1 篇 jiachen shen
  • 1 篇 jia xiao-yun
  • 1 篇 wang shuhong qi ...
  • 1 篇 zhang jie
  • 1 篇 yuan chao-wei
  • 1 篇 zhang futai
  • 1 篇 xiaolei dong
  • 1 篇 yang shuangxi
  • 1 篇 zhenfu cao
  • 1 篇 liuyi xiangming-...
  • 1 篇 k. krishnamoorth...
  • 1 篇 bin li
  • 1 篇 zhusen liu

语言

  • 11 篇 英文
  • 1 篇 中文
检索条件"主题词=Verifiable Secret Sharing"
12 条 记 录,以下是11-20 订阅
排序:
An Anonymous Payment Protocol with Mobile Agents in Hostile Environments
An Anonymous Payment Protocol with Mobile Agents in Hostile ...
收藏 引用
The 1st Chinese Conference on Trusted Computing and Information Security
作者: LIU Yi,XIANG Ming-sen, WANG Yu-min National Key Laboratory on Integrated Server Networks, Xidian University, Xi''an 710071, Shaanxi, China
<正> By using Pedersen’s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymouspayment protocol which have following features: protecting the confidentiality of sensitive payme... 详细信息
来源: cnki会议 评论
Secure and Efficient VSS Scheme Based on Partial Broadcast Channels
Secure and Efficient VSS Scheme Based on Partial Broadcast C...
收藏 引用
第四届全国信息检索与内容安全学术会议
作者: Jialing WANG~(1,2) Yanqin ZHU~(1,2) Xizhao LUO~(1,2) ~1School of Computer Science & Technology,Soochow University,Su Zhou 215006,China ~2Jiangsu Provincial Key Laboratory of Computer Information Processing Technology,Su Zhou 215006,China
In the conventional verifiable secret sharing scheme,a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of *** and Wang proposed a secret sharing scheme based on partial broa... 详细信息
来源: cnki会议 评论