检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:GUOYuanbo MAJianfeng
机构地区:[1]TheMinistryofEducationKeyLaboratoryofComputerNetworksandInformationSecurity,XidianUniversity,Xi'an710071,China [2]TheMinistryofEducationKeyLaboratoryofComputerNetworksandInformationSecurity,XidianUniversity,Xi'an710071,China
出 处:《Chinese Journal of Electronics》2005年第3期393-395,共3页电子学报(英文版)
摘 要:The secret sharing realizing the prohibited structure, which specifies the corruptible subsets of participants, can be determined directly by exploitation of the system setting and the attributes of all participants. Recently, Sun et al. had proposed a construction of secret sharing for graph-based prohibited structures where a vertex denotes a participant and an edge a pair of participants who cannot recover the secret. But their scheme is inefficient and costly. In this paper, we present a new and efficient secret sharing realizing graph-based prohibited structures and prove that the scheme satisfies both properties of the secret sharing scheme, i.e. the reconstruction property and the perfect property. The main features of our scheme are that it only needs some modular additions and subtractions in both shares assignment phase and secret recovery phase, which is an advantage in terms of computational complexity, and it can achieve higher information rate than existing ones.
分 类 号:TP316.6[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.224.61.14