咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 工学
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 计算机科学与技术...

主题

  • 1 篇 group identifica...
  • 1 篇 multi-prover zer...
  • 1 篇 leakproof secret...
  • 1 篇 secret sharing
  • 1 篇 proof of knowl-e...

机构

  • 1 篇 state key labora...
  • 1 篇 department of ma...
  • 1 篇 school of mathem...

作者

  • 1 篇 2 state key labo...
  • 1 篇 3 department of ...
  • 1 篇 tang chunming 1 ...

语言

  • 1 篇 英文
检索条件"主题词=group identification scheme"
1 条 记 录,以下是1-10 订阅
排序:
Leakproof secret sharing protocols with applications to group identification scheme
收藏 引用
Science China(Information Sciences) 2012年 第5期55卷 1172-1185页
作者: TANG ChunMing 1,2 & GAO ShuHong 3 1 School of Mathematics and Information Science,Guangzhou University,Guangzhou 510006,China 2 State Key Laboratory of Information Security,Institute of Software Science,Chinese Academy of Sciences,Beijing 100049,China 3 Department of Mathematical Sciences,Clemson University,SC 29634,USA School of Mathematics and Information Science Guangzhou University Guangzhou China State Key Laboratory of Information Security Institute of Software Science Chinese Academy of Sciences Beijing China Department of Mathematical Sciences Clemson University Clemson USA
In a traditional (t,n)-threshold secret sharing scheme,t or more honest participants can reconstruct the secret *** the reconstruction process,the individual shares and the secret key K are revealed,hence K is shared ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论