earticle

논문검색

A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction

목차

Abstract
 1. Introduction
 2. Preliminaries
  2.1 Shamir's (t, n) Secret Sharing Scheme [1]
  2.2 Pedersen's (n, t, n) Secret Sharing Scheme [7]
  2.3 Harn's Secure Secret Reconstruction Scheme [11]
 3. Definition and Security Requirements
 4. The Proposed Secret Sharing Scheme
  4.1 Notations
  4.2 Desription
  4.3 Algorithms
  4.4 Security Analysis
 5. The Proposed Multi-secret Sharing Scheme
  5.1 Notations
  5.2 Description
  5.3 Algorithms
  5.4 Security Analysis
 6. Comparison
 7. Conclusion
 Acknowledgments
 References

저자정보

  • Li Meng College of Information Engineering, Qingdao University, 266071 Qingdao, China
  • Qu Shaoyun Software Technology College, Qingdao University, 266071 Qingdao, China
  • Xun Tiantian College of Information Engineering, Qingdao University, 266071 Qingdao, China
  • Yu Jia College of Information Engineering, Qingdao University, 266071 Qingdao, China, Shandong provincial Key Laboratory of Computer Network, 250014 Jinan, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.