Cheater identification in threshold scheme
A scheme can detection cheater correctly is proposed.The quantity of the scheme is detection and cheater identification efficient and simple.The attack is as difficult as factoring the product of large numbers.
Saved in:
Main Authors: | DUAN Xiao-yi1, QI Wen-hua1, ZHANG Qi-shan1, WANG Zhong-wen2 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2005-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74667535/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
(t, n) threshold secret sharing scheme without SDC
by: ZHOU Fu-cai, et al.
Published: (2006-01-01) -
Provably secure secret sharing scheme based on bilinear maps
by: LI Hui-xian1, et al.
Published: (2008-01-01) -
Efficiency identity-based threshold group signature scheme
by: LIU Hong-wei 1, et al.
Published: (2009-01-01) -
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
by: XU Jing-fang1, et al.
Published: (2009-01-01) -
Two new color (n, n)-secret sharing schemes
by: YI Feng, et al.
Published: (2007-01-01)