咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 工学
    • 1 篇 网络空间安全
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 multi-secret sha...
  • 1 篇 linear code
  • 1 篇 optimal linear m...
  • 1 篇 non-threshold mu...
  • 1 篇 verifiable secre...
  • 1 篇 complexity
  • 1 篇 secret sharing
  • 1 篇 monotone span pr...
  • 1 篇 linear multi-sec...
  • 1 篇 hermite interpol...
  • 1 篇 randomness

机构

  • 1 篇 state key labora...
  • 1 篇 kowa electric in...
  • 1 篇 key laboratory o...
  • 1 篇 department of in...
  • 1 篇 school of inform...
  • 1 篇 academyofmathema...
  • 1 篇 school of mathem...

作者

  • 1 篇 xlaoliangliang l...
  • 1 篇 tomoko adachi
  • 1 篇 shu-guang dai
  • 1 篇 chie okazaki
  • 1 篇 chun-ming tang

语言

  • 3 篇 英文
检索条件"主题词=multi-secret sharing scheme"
3 条 记 录,以下是1-10 订阅
排序:
A Verifiable multi-secret sharing scheme Based on Hermite Interpolation
收藏 引用
Journal of Mathematics and System Science 2014年 第9期4卷 587-592页
作者: Tomoko Adachi Chie Okazaki Department of Information Sciences Toho University 274-8510 Japan Kowa Electric Industry CO LTD
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Complexity and Randomness of Linear multi-secret sharing schemes with Non-threshold Structures
收藏 引用
Acta Mathematicae Applicatae Sinica 2014年 第4期30卷 1073-1084页
作者: Chun-ming Tang Shu-guang DAI School of Mathematics and Information Science Guangzhou University Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes Guangzhou University State Key Laboratory of Information Security School of Information Science and Technology Sun Yat-Sen University
In a linear multi-secret sharing scheme with non-threshold structures, several secret values are shared among n participants, and every secret value has a specified access structure. The efficiency of a multi- secret ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Linear multi-secret sharing schemes
收藏 引用
Science in China(Series F) 2005年 第1期48卷 125-136页
作者: XlAOLiangliang LIUMulan AcademyofMathematicsandSystemSciencesandKeyLaboratoryofMathematicsMechanization ChineseAcademyofSciencesBeijing100080China
In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access str... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论