完整後設資料紀錄
DC 欄位語言
dc.contributor.authorSun, HMen_US
dc.contributor.authorShieh, SPen_US
dc.date.accessioned2014-12-08T15:47:30Z-
dc.date.available2014-12-08T15:47:30Z-
dc.date.issued1998-10-01en_US
dc.identifier.issn0898-1221en_US
dc.identifier.urihttp://hdl.handle.net/11536/31835-
dc.description.abstractA secret sharing scheme for the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain prespecified subsets of participants cannot recover the master key. A secret sharing scheme is called perfect, if any subset of participants who cannot recover the master key obtains no information regarding the master key. In this paper, we propose an efficient construction of perfect secret sharing schemes for graph-based prohibited structures where a vertex denotes a participant and an edge does a pair of participants who cannot recover the master key. The information rate of our scheme is 2/n, where n is the number of participants. (C) 1998 Elsevier Science Ltd. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectcryptographyen_US
dc.subjectdata securityen_US
dc.subjectinformation theoryen_US
dc.subjectsecret sharing schemeen_US
dc.titleSecret sharing schemes for graph-based prohibited structuresen_US
dc.typeArticleen_US
dc.identifier.journalCOMPUTERS & MATHEMATICS WITH APPLICATIONSen_US
dc.citation.volume36en_US
dc.citation.issue7en_US
dc.citation.spage131en_US
dc.citation.epage140en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
顯示於類別:期刊論文


文件中的檔案:

  1. 000076274800010.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。