期刊文献+

基于单向函数与二元多项式的秘密分享方案 被引量:2

A Secret Sharing Scheme Based on One-Way Function and Bivariate Polynomial
在线阅读 下载PDF
导出
摘要 基于二元多项式的秘密分享方案,利用单向函数和二元多项式构造了一个(t+1,n)门限秘密分享方案.该方案易实现成员的加入和系统的更新. Based on the secret sharing scheme scheme is constructed by the one-way function systems is easily realized. of the bivariate polynomial, a ( t + 1, n) as well as bivariate polynomial. Adding threshold secret sharing members and updating
出处 《鲁东大学学报(自然科学版)》 2014年第3期223-226,共4页 Journal of Ludong University:Natural Science Edition
基金 国家自然科学基金(11261060) 福建省自然科学基金(2012J01022)
关键词 单向函数 二元多项式 秘密分享方案 one-way function bivariate polynomial secret sharing scheme
  • 相关文献

参考文献7

  • 1Shamir A. How to share a secret[J].Communications of the ACM,1979,(11):612-613.
  • 2Blakley G R. Safeguarding cryptographic keys[A].1979.313-317.
  • 3Asmuth C,Bloom J. A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,(02):208-210.
  • 4Brickell E F,Davenport D M. On the classification of ideal secret sharing schemes[J].Journal of Cryptology,1991,(02):123-134.
  • 5Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting[A].Heidelberg:Springer-Verlag,1999.148-164.
  • 6唐聃,舒红平.基于二元多项式的秘密分享技术研究[J].计算机应用与软件,2012,29(7):112-114. 被引量:2
  • 7Hwang R J,Chang C C. An on-line secret sharing scheme for multi-secrets[J].Computer Communications,1998,(13):1170-1176.

二级参考文献7

  • 1Shamir A. How to share a secret [ J ]. Commun. ACM, 1979,22 ( 11 ) : 612 -613.
  • 2Blakley G R. Safeguarding cryptographic keys [ C ]//Proc. Nut. Computer Conf. AFIPS Conf. Proc. 1979,48 ( 6 ) : 313 - 317.
  • 3Asmuth G, Bloom A. A modular approach to key safeguarding [ J ]. IEEE Transactions on Information Theory, 1983,29 ( 2 ) :208 - 210.
  • 4Mitsuru Ito, Akira Saito Nonmember, Takao Nishizeki Member. Secret sharing scheme realizing general access structure [ J ]. Electronics and Communications in Japan Part Ⅲ: Fundamental Electronic Science, 1989,72(9) :56-64.
  • 5Benaloh J C. Secret sharing homomorphisms : keeping shares of a secret secret[ C ]//Advances in Cryptology, Lecture Notes in Computer Science,1987,263 (20) :251 -260.
  • 6Brickell E F, Davenport D M. On the classification of ideal secret sharing schemes [ C ]//Lecture Notes in Computer Science, 1991,89 ( 1 ) : 278 - 285.
  • 7Benaloh J, Leichter J. Generalized secret sharing and monotone functions [ C ]//Lecture Notes in Computer Science, 1989,403 (88) :27 - 35.

共引文献1

同被引文献14

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部