完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLin, Phen-Lan
dc.date.accessioned2009-08-23T04:39:18Z
dc.date.accessioned2020-05-25T06:25:10Z-
dc.date.available2009-08-23T04:39:18Z
dc.date.available2020-05-25T06:25:10Z-
dc.date.issued2006-10-31T09:13:12Z
dc.date.submitted1996-12-19
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2942-
dc.description.abstractA unified mode US2 which contains a pair of encoder-decoder and a channel is presented to emulate the secret sharing systems of various schemes. Depending on collusion is permitted or not in the particular system, the encoder-decoder pair and channel vary. The channel for collusion-nonpermissible US2 is developed. Its capacity is derived and used to establish the bounds on the (1,p,r,n) secret sharing scheme. The channel and a possible coding scheme in investigated as well for US2 which allows players collude. Secret sharing scheme (t,n) threshold scheme (1,p,r,n) secret sharing scheme non-systematic linear code Reed-Solomon code t-private t-resilient code Reed-Solomon code t-private t-resilient collusion-permissible secret sharing model collusion-nonpermissible secret sharing model
dc.description.sponsorship中山大學,高雄市
dc.format.extent6p.
dc.format.extent556572 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries1996 ICS會議
dc.subject.otherSecret Sharing Schemes
dc.titleA Unified Model for Collusion-Permissible and Nonpermissible Secret Sharing Systems
分類:1996年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics001996000241.pdf543.53 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。