期刊文献+

一种新的(k,n)阈值可视密钥分存方案 被引量:7

A Novel(k,n) Threshold Scheme for Visual Secret Sharing
在线阅读 下载PDF
导出
摘要 本文提出(k,n)阈值可视秘密分存的一种新的分析和实现方案.该方案从可视分存的对比度条件和安全性条件入手,建立起一个方程组,最后得到其近似最优解和基本矩阵的构造方案.该方案将(k,n)和(n,n)方案统一起来分析,使之和谐统一;同时,通过理论分析代替了以往算法的部分工作;本文给出的算法可达到以往方案的安全强度而具备更高的实现效率. A novel k-out-of-n threshold scheme for visual secret sharing is proposed. The construction scheme of basic matrix is brought forward from the approximate best optimized solution of the equation set which is established on the basis of contrast condition and security condition of the visual secret sharing. The proposed method analyses the ( k, n) and ( n, n) schemes uniformly and brings them into an integral framework. Furthermore, a fraction of algorithm operations were replaced by theoretical analysis in the new scheme. Consequently, it achieves higher efficiency with same security intensity compared with the previous schemes.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第3期503-507,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.90304014) 国家863高技术研究发展计划(No.2005AA114160)
关键词 阈值 秘密分存 可视密码 threshold secrest sharing visual cryptography
  • 相关文献

参考文献16

  • 1Blakley G R.Safeguarding cryptographic keys[A].Proceedings of National Computer Conference[C].Montvale,NJ:AFIPS Press,1979,48.313-317.
  • 2Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612 -613.
  • 3Ito M,Saito A,Nishizeki T.Secret sharing scheme realizing general access structure[A].Proceedings IEEE Globecom'87[C].Tokyo,Japan:IEEE,1987.99-102.
  • 4Naor M,Shamir A.Visual cryptography[A].Advances in Cryptology-Eurocrypt'94,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1995.950.1-12.
  • 5Droste S.New result on visual cryptography[A].Advances in Cryptology-CRYPTO'96,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1996.1109:401 -415.
  • 6Zheng H.Linear threshold schemes,visual cryptography,and parasite-host cryptosystems[D].Texas,USA:Texas A&M university,1998.
  • 7Krause M,Simon H.Determining the optimal contrast for secret sharing schemes in visual cryptography[J].Combinatorics Probability and computng,2003,12 (3):285-299.
  • 8Blundo C,D'Arco P,et al.Contrast optimal threshold visual cryptography schemes[J].SIAM Journal on Discrete Mathematics,2003,16(2):224 -261.
  • 9Blundo C,De Santis A.Visual cryptography schemes with perfect reconstruction of black pixels[J].Computers & Graphics,1998,22 (4):449-455.
  • 10Eisen P A,Stinson D R,Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels[J].Designs,Codes and Cryptography,2002,25(1):15 -61.

同被引文献93

引证文献7

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部