원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.9 No.1
2015.01
pp.191-204
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Preliminaries
2.1 Shamir's (t, n) Secret Sharing Scheme [1]
2.2 Pedersen's (n, t, n) Secret Sharing Scheme [7]
2.3 Harn's Secure Secret Reconstruction Scheme [11]
3. Definition and Security Requirements
4. The Proposed Secret Sharing Scheme
4.1 Notations
4.2 Desription
4.3 Algorithms
4.4 Security Analysis
5. The Proposed Multi-secret Sharing Scheme
5.1 Notations
5.2 Description
5.3 Algorithms
5.4 Security Analysis
6. Comparison
7. Conclusion
Acknowledgments
References
1. Introduction
2. Preliminaries
2.1 Shamir's (t, n) Secret Sharing Scheme [1]
2.2 Pedersen's (n, t, n) Secret Sharing Scheme [7]
2.3 Harn's Secure Secret Reconstruction Scheme [11]
3. Definition and Security Requirements
4. The Proposed Secret Sharing Scheme
4.1 Notations
4.2 Desription
4.3 Algorithms
4.4 Security Analysis
5. The Proposed Multi-secret Sharing Scheme
5.1 Notations
5.2 Description
5.3 Algorithms
5.4 Security Analysis
6. Comparison
7. Conclusion
Acknowledgments
References
저자정보
참고문헌
자료제공 : 네이버학술정보