Full metadata record
DC FieldValueLanguage
dc.contributor.authorSun, HMen_US
dc.contributor.authorShieh, SPen_US
dc.date.accessioned2014-12-08T15:46:57Z-
dc.date.available2014-12-08T15:46:57Z-
dc.date.issued1999-02-01en_US
dc.identifier.issn0898-1221en_US
dc.identifier.urihttp://hdl.handle.net/11536/31558-
dc.description.abstractA secret sharing scheme is a method which allows a secret to be shared among a set of participants in such a way that only qualified subsets of participants can recover the secret. A secret sharing scheme is called perfect if unqualified subsets of participants obtain no information regarding the secret. The information rate of a secret sharing scheme is defined to be the ratio between the size of secret and the maximum size of the shares. In this paper, we propose some recursive constructions for perfect secret sharing schemes with access structures of constant rank. Compared with the best previous constructions, our constructions have some improved lower bounds on the information rate. (C) 1999 Elsevier Science Ltd. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectcryptographyen_US
dc.subjectsecret sharing schemeen_US
dc.subjectinformation theoryen_US
dc.subjectaccess structuresen_US
dc.titleRecursive constructions for perfect secret sharing schemesen_US
dc.typeArticleen_US
dc.identifier.journalCOMPUTERS & MATHEMATICS WITH APPLICATIONSen_US
dc.citation.volume37en_US
dc.citation.issue3en_US
dc.citation.spage87en_US
dc.citation.epage96en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000078640600010-
dc.citation.woscount4-
Appears in Collections:Articles


Files in This Item:

  1. 000078640600010.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.