首页 | 本学科首页   官方微博 | 高级检索  
     

An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters
引用本文:XIE Shu cui 1,ZHANG Jian zhong 2 (1. Department of Applied Mathematics and Physics,Xi''''an Institute of Posts and Telecommunications,Xi''''an 710061,P.R. China, 2. College of Mathematics and Information Science,Shanxi Normal University,Xi''''an 710062,P.R.China). An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters[J]. 中国邮电高校学报(英文版), 2003, 10(3)
作者姓名:XIE Shu cui 1  ZHANG Jian zhong 2 (1. Department of Applied Mathematics and Physics  Xi''''an Institute of Posts and Telecommunications  Xi''''an 710061  P.R. China   2. College of Mathematics and Information Science  Shanxi Normal University  Xi''''an 710062  P.R.China)
作者单位:1. Department of Applied Mathematics and Physics,Xi'an Institute of Posts and Telecommunications,Xi'an 710061,P.R. China; 2. College of Mathematics and Information Science,Shanxi Normal University,Xi'an 710062,P.R.China
基金项目:ThisworkissupportedbytheShaanxiNatureScienceFoundation (No.2 0 0 2A0 3)
摘    要:1 Introduction(k ,n) thresholdschemesare proposedbyBlakley[1 ] andShamir[2 ] respectively .Assoonastheywereproposed ,theywerepaidattentiontobe causeoftheirimportantusesinmanyaspectssuchaskeymanagementinsecrecycommunication ,securitycalculation ,datasecurity ,securitymanagementoffinancenet,etc .[3~ 1 0 ] A (k,n) thresholdsecrecysharingschemeisasfollows:Dividingagivensecretsintonsharessuchthat( 1 )knowingkormoresharesonecanobtains;and( 2 )knowingk- 1orfewsharesonecannotde termines.LetP ={P…


An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters
XIE Shu-cui,ZHANG Jian-zhong. An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters[J]. The Journal of China Universities of Posts and Telecommunications, 2003, 10(3)
Authors:XIE Shu-cui  ZHANG Jian-zhong
Abstract:In this paper an advanced threshold secret sharing scheme for identifying cheaters is proposed by using authentication codes. The performance of the scheme is discussed. The results show that in the scheme the valid shareholders can not only identify the impersonation of an adversary, but also detect cheating of some valid shareholders. In particular one honest shareholder is able to detect cheating of other participants forming a collection, and the information rate of the scheme is higher than that of others.
Keywords:secret sharing  authentication codes  threshold scheme  cheating
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号