咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 网络空间安全
    • 2 篇 计算机科学与技术...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 5 篇 threshold secret...
  • 1 篇 chinese remainde...
  • 1 篇 multihop shareho...
  • 1 篇 projective trans...
  • 1 篇 wireless environ...
  • 1 篇 randomized compo...
  • 1 篇 transaction priv...
  • 1 篇 bitcoin
  • 1 篇 multihop secret ...
  • 1 篇 paillier cryptos...
  • 1 篇 residual vector ...
  • 1 篇 nonzero <i>k</i>...
  • 1 篇 signature
  • 1 篇 group oriented
  • 1 篇 one-time public ...
  • 1 篇 two-party signin...
  • 1 篇 provable securit...
  • 1 篇 share protection
  • 1 篇 account security
  • 1 篇 sm2

机构

  • 1 篇 school of mathem...
  • 1 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 school of mathem...
  • 1 篇 school of comput...
  • 1 篇 department of in...
  • 1 篇 department of co...

作者

  • 1 篇 fan yuanyuan
  • 1 篇 miao fuyou
  • 1 篇 xiong yan
  • 1 篇 prakash veerarag...
  • 1 篇 li yuanyuan
  • 1 篇 mingwu zhang
  • 1 篇 yuan dong
  • 1 篇 moaman badawy
  • 1 篇 seleviawati tarm...
  • 1 篇 liu yaohui
  • 1 篇 kim-kwang raymon...
  • 1 篇 debiao he
  • 1 篇 wang xingfu
  • 1 篇 bin li
  • 1 篇 yudi zhang
  • 1 篇 liu zhenhua
  • 1 篇 somnath ghosh

语言

  • 5 篇 英文
检索条件"主题词=threshold secret sharing"
5 条 记 录,以下是1-10 订阅
排序:
Improvement on the Multihop Shareholder Discovery for threshold secret sharing in MANETs
收藏 引用
Journal of Computer Science & Technology 2011年 第4期26卷 711-721页
作者: Seleviawati Tarmizi Prakash Veeraraghavan Somnath Ghosh Department of Computer Science and Computer Engineering La Trobe University
The collaboration of at least a threshold number of secret shareholders in a threshold secret sharing scheme is a strict requirement to ensure its intended functionality. Due to its promising characteristics, such a s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A(t, m, n)-Group Oriented secret sharing Scheme
收藏 引用
Chinese Journal of Electronics 2016年 第1期25卷 174-178页
作者: MIAO Fuyou FAN Yuanyuan WANG Xingfu XIONG Yan Moaman Badawy School of Computer Science and Technology University of Science and Technology of China
Basic(t, n)-secret sharing(SS) schemes share a secret among n shareholders by allocating each a share. The secret can be reconstructed only if at least t shares are available. An adversary without a valid share may ob... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
收藏 引用
Frontiers of Computer Science 2020年 第3期14卷 203-215页
作者: Yudi ZHANG Debiao HE Mingwu ZHANG Kim-Kwang Raymond CHOO Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Computer Sciences Hubei University of TechnologyWuhan 430068China Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering University of Texas at San AntonioSan AntonioTX 78249USA
Mobile devices are widely used for data access,communications and ***,storing a private key for signature and other cryptographic usage on a single mobile device can be challenging,due to its computational ***,a numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Security of account and privacy of transaction for bitcoin
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2018年 第5期25卷 20-30,48页
作者: Liu Zhenhua Yuan Dong Liu Yaohui Li Yuanyuan School of Mathematics and Statistics Xidian University
As a kind of cryptocurrency, bitcoin has attracted much attention with its decentralization. However, there is two problems in the bitcoin transactions : the account security and transaction privacy. In view of the a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Verifiable secret sharing Scheme Based on Certain Projective Transformation
收藏 引用
American Journal of Computational Mathematics 2021年 第2期11卷 175-188页
作者: Bin Li School of Mathematics Chengdu Normal University Chengdu China
The main purpose of verifiable secret sharing scheme is to solve the honesty problem of participants. In this paper, the concept of nonzero k-submatrix and theresidual vector of system of hyperplane intersecting line ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论