Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (12): 20-22.
• 博士论坛 • Previous Articles Next Articles
Yan-Shuo Zhang
Received:
Revised:
Online:
Published:
Contact:
张艳硕 刘卓军
通讯作者:
Abstract: Generally, we just research on (n, t) secret sharing scheme. In this article, we will show (m+n,t1+t2) threshold secret sharing, which is an generalized scheme of (n, t) secret sharing, and we will give (m+n,t1+t2) threshold secret sharing schemes based on difference and Shamir scheme of special access right.
摘要: 在秘密共享案中,一般研究(n,t)门限秘密共享方案。我们给出的是具有特殊权限的(m+n,t1+t2)门限秘密共享方案,它是(n,t)门限秘密共享方案推广形式的门限秘密共享方案。基于差分我们给出(m+n,t1+t2)门限秘密共享方案,又基于Shamir方案给出(m+n,t1+t2)门限秘密共享的另一方案。
Yan-Shuo Zhang. Threshold Secret Sharing Scheme Based on Difference and Shamir Scheme of Special Access Right[J]. Computer Engineering and Applications, 2007, 43(12): 20-22.
张艳硕 刘卓军. 基于差分的特殊权限(m+n,t1+t2)门限秘密共享[J]. 计算机工程与应用, 2007, 43(12): 20-22.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/
http://cea.ceaj.org/EN/Y2007/V43/I12/20