Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (17): 15-17.

• 博士论坛 • Previous Articles     Next Articles

Generalized threshold secret sharing scheme among weighted participants of special access right

ZHANG Yan-shuo1,2,LIU Zhuo-jun2,DU Yao-gang1   

  1. 1.Beijing Electronic Science and Technology Institute,Beijing 100070,China
    2.Key Lab of MMRC,CAS,Beijing,100080,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-06-11 Published:2007-06-11
  • Contact: ZHANG Yan-shuo

特殊权限下权重不同参与者的广义门限方案

张艳硕1,2,刘卓军2,杜耀刚1   

  1. 1.北京电子科技学院 北京 100070
    2.中国科学院 数学机械化重点实验室 北京 100080
  • 通讯作者: 张艳硕

Abstract: Generally,we just research on (n,t) threshold secret sharing scheme.In this article,we will show (m+n1+n2+…+nl,t+1+1+…+1)and (m+n1+…+nl,t+t1+…+tl) threshold secret sharing scheme among weighted participants of special access right,which is an generalized scheme of (m+n,t+1)threshold secret sharing,and we will give (m+n1+n2+…+nl,t+1+1+…+1)and (m+n1+…+nl,t+t1+…+tl) threshold secret sharing schemes among weighted participants based on CRT of special access right.

摘要: 在秘密共享案中,一般集中于(n,t)门限秘密共享方案的研究。文中给出的是具有特殊权限的参与者权重不同的(m+n1+n2+…+nl,t+1+1+…+1)门限秘密共享方案和(m+n1+…+nl,t+t1+…+tl)门限秘密共享方案,它们是(m+n,t+1)门限秘密共享方案的推广形式。基于中国剩余定理分别给出具有特殊权限的且参与者具有不同权重的(m+n1+n2+…+nl,t+1+1+…+1)门限秘密共享方案和(m+n1+…+nl,t+t1+…+tl)门限秘密共享方案。