AN IDEAL MULTI-SECRET SHARING SCHEME BASED ON MSP

被引:0
|
作者
Hei, Zan [1 ]
Li, Zhi-Hui [1 ]
Wu, Xingxing [1 ]
机构
[1] Shaanxi Normal Univ, Coll Math & Informat Sci, Xian 710062, Peoples R China
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new ideal linear multi-secrets sharing scheme based on monotone span programs is proposed in this paper. The minimum access structures of our scheme are constructed by t continuous participants sets. It is a verifiable scheme, which can efficiently prevent cheating among participants. Meanwhile this scheme has a simple construction, a little calculated amount, and strong practicability. We also prove that our scheme is prefect.
引用
收藏
页码:246 / 251
页数:6
相关论文
共 50 条
  • [1] An ideal multi-secret sharing scheme based on MSP
    Hsu, Ching-Fang
    Cheng, Qi
    Tang, Xueming
    Zeng, Bing
    [J]. INFORMATION SCIENCES, 2011, 181 (07) : 1403 - 1409
  • [2] An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs
    Hsu, Ching-Fang
    Harn, Lein
    Cui, Guohua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (01) : 383 - 394
  • [3] An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs
    Ching-Fang Hsu
    Lein Harn
    Guohua Cui
    [J]. Wireless Personal Communications, 2014, 77 : 383 - 394
  • [4] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [5] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [6] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [7] A new multi-secret image sharing scheme based on DCT
    Oinam Bidyapati Chanu
    Arambam Neelima
    [J]. The Visual Computer, 2020, 36 : 939 - 950
  • [8] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    [J]. INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894
  • [9] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [10] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48