Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (20): 143-144.

• 网络、通信与安全 • Previous Articles     Next Articles

Another threshold secret sharing scheme based on special access right

ZHANG Yan-shuo1,2,LIU Zhuo-jun2   

  1. 1.Beijing Electronic Science and Technology Institute,Beijing 100070,China
    2.Key Lab of MMRC,China Academy of Sciences,Beijing,100080,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-07-11 Published:2007-07-11
  • Contact: ZHANG Yan-shuo

基于特殊权限的另一门限秘密共享方案

张艳硕1,2,刘卓军2   

  1. 1.北京电子科技学院,北京 100070
    2.中国科学院 数学机械化重点实验室,北京 100080
  • 通讯作者: 张艳硕

Abstract: In secret sharing,generally,we just research on(n,t) secret sharing scheme.Based on special access right(m+n,t+1)threshold secret sharing is an generalized scheme of(n,t) secret sharing,and we will give another(m+n,t+1) threshold secret sharing scheme based on Shamir scheme under special access right.

Key words: secret sharing scheme, special access right, threshold secret sharing

摘要: 在秘密共享方案中,一般研究(n,t)门限秘密共享方案。具有特殊权限的(m+n,t+1)门限秘密共享方案是(n,t)门限秘密共享方案推广形式的门限秘密共享方案。在差分门限秘密共享方案的基础上构造基于Shamir方案,给出了(m+n,t+1)门限秘密共享的另一方案。

关键词: 秘密共享方案, 特殊权限, 门限秘密共享方案