Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (17): 15-17.
• 博士论坛 • Previous Articles Next Articles
ZHANG Yan-shuo1,2,LIU Zhuo-jun2,DU Yao-gang1
Received:
Revised:
Online:
Published:
Contact:
张艳硕1,2,刘卓军2,杜耀刚1
通讯作者:
Abstract: Generally,we just research on (n,t) threshold secret sharing scheme.In this article,we will show (m+n1+n2+…+nl,t+1+1+…+1)and (m+n1+…+nl,t+t1+…+tl) threshold secret sharing scheme among weighted participants of special access right,which is an generalized scheme of (m+n,t+1)threshold secret sharing,and we will give (m+n1+n2+…+nl,t+1+1+…+1)and (m+n1+…+nl,t+t1+…+tl) threshold secret sharing schemes among weighted participants based on CRT of special access right.
摘要: 在秘密共享案中,一般集中于(n,t)门限秘密共享方案的研究。文中给出的是具有特殊权限的参与者权重不同的(m+n1+n2+…+nl,t+1+1+…+1)门限秘密共享方案和(m+n1+…+nl,t+t1+…+tl)门限秘密共享方案,它们是(m+n,t+1)门限秘密共享方案的推广形式。基于中国剩余定理分别给出具有特殊权限的且参与者具有不同权重的(m+n1+n2+…+nl,t+1+1+…+1)门限秘密共享方案和(m+n1+…+nl,t+t1+…+tl)门限秘密共享方案。
ZHANG Yan-shuo1,2,LIU Zhuo-jun2,DU Yao-gang1. Generalized threshold secret sharing scheme among weighted participants of special access right [J]. Computer Engineering and Applications, 2007, 43(17): 15-17.
张艳硕1,2,刘卓军2,杜耀刚1. 特殊权限下权重不同参与者的广义门限方案[J]. 计算机工程与应用, 2007, 43(17): 15-17.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/
http://cea.ceaj.org/EN/Y2007/V43/I17/15