Full metadata record
DC FieldValueLanguage
dc.contributor.authorSun, HMen_US
dc.contributor.authorShieh, SPen_US
dc.date.accessioned2014-12-08T15:47:30Z-
dc.date.available2014-12-08T15:47:30Z-
dc.date.issued1998-10-01en_US
dc.identifier.issn0898-1221en_US
dc.identifier.urihttp://hdl.handle.net/11536/31835-
dc.description.abstractA secret sharing scheme for the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain prespecified subsets of participants cannot recover the master key. A secret sharing scheme is called perfect, if any subset of participants who cannot recover the master key obtains no information regarding the master key. In this paper, we propose an efficient construction of perfect secret sharing schemes for graph-based prohibited structures where a vertex denotes a participant and an edge does a pair of participants who cannot recover the master key. The information rate of our scheme is 2/n, where n is the number of participants. (C) 1998 Elsevier Science Ltd. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectcryptographyen_US
dc.subjectdata securityen_US
dc.subjectinformation theoryen_US
dc.subjectsecret sharing schemeen_US
dc.titleSecret sharing schemes for graph-based prohibited structuresen_US
dc.typeArticleen_US
dc.identifier.journalCOMPUTERS & MATHEMATICS WITH APPLICATIONSen_US
dc.citation.volume36en_US
dc.citation.issue7en_US
dc.citation.spage131en_US
dc.citation.epage140en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
Appears in Collections:Articles


Files in This Item:

  1. 000076274800010.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.