WEKO3
アイテム
Construction of Dynamic Threshold Scheme
https://ipsj.ixsq.nii.ac.jp/records/74822
https://ipsj.ixsq.nii.ac.jp/records/7482278b5e02f-2f98-48d6-849d-2bd50b65e24d
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2009 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Symposium(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2009-10-19 | |||||||
タイトル | ||||||||
タイトル | Construction of Dynamic Threshold Scheme | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | Construction of Dynamic Threshold Scheme | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | ハッシュ関数・秘密分散 | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_5794 | |||||||
資源タイプ | conference paper | |||||||
著者所属 | ||||||||
Dalian University of Technology,School of Software | ||||||||
著者所属 | ||||||||
Dalian University of Technology,School of Software | ||||||||
著者所属 | ||||||||
Dalian University of Technology,School of Software | ||||||||
著者所属 | ||||||||
Kyushu University, Dept. of Informatics | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Dalian University of Technology,School of Software | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Dalian University of Technology,School of Software | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Dalian University of Technology,School of Software | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Kyushu University, Dept. of Informatics | ||||||||
著者名 |
Cheng, Guo
× Cheng, Guo
|
|||||||
著者名(英) |
Cheng, Guo
× Cheng, Guo
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | In this paper, we provide a new dynamic threshold secret sharing scheme based on Shamir’s scheme and YCH’s scheme. In our scheme, the participants just need to broadcast the rj that is related to the secret that they want to obtain to other participants, and the corresponding threshold scheme will be constructed. And the whole reconstructed process doesn’t need the trusted dealer’s participation | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | In this paper, we provide a new dynamic threshold secret sharing scheme based on Shamir’s scheme and YCH’s scheme. In our scheme, the participants just need to broadcast the rj that is related to the secret that they want to obtain to other participants, and the corresponding threshold scheme will be constructed. And the whole reconstructed process doesn’t need the trusted dealer’s participation | |||||||
書誌情報 |
コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集 巻 2009, p. 1-6, 発行日 2011-10-12 |
|||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 情報処理学会 |