完整後設資料紀錄
DC 欄位語言
dc.contributor.authorWang, Shiuh-Jeng
dc.contributor.authorTsai, Yuh-Ren
dc.contributor.authorChen, Pin-You
dc.date.accessioned2009-08-23T04:44:14Z
dc.date.accessioned2020-05-25T06:51:21Z-
dc.date.available2009-08-23T04:44:14Z
dc.date.available2020-05-25T06:51:21Z-
dc.date.issued2008-11-11T06:33:12Z
dc.date.submitted2008-04-01
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/10968-
dc.description.abstractA secret sharing scheme protects the secret by distributing it to a group of participants (nodes), and it allows for some groups of participants to collaborate together to reconstruct this secret. With regard to the (k, n) threshold scheme, k out of n or more participants can reconstruct the secret. The proactive secret sharing scheme periodically updates the distributed secret (shadow). Based on such a proactive secret sharing scheme, we propose a completely mobile proactive secret sharing scheme, which not only allows for the changing of participant number n, but also arbitrarily changes the threshold k. Furthermore, we apply our technical idea to a specified project exploitation in the real commerce transaction systems to fulfill a trust-based delivery.
dc.format.extent10p.
dc.relation.isversionofVol19
dc.relation.isversionofNo1
dc.subjectThreshold secret sharing
dc.subjectproactive secret sharing
dc.subjectsharing polynomial
dc.subjectdecision-making
dc.titleStrategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System
分類:Journal of Computers第19卷

文件中的檔案:
檔案 描述 大小格式 
JOC_19_1_5.pdf243.24 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。