𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Analysis of a kind of quantum cryptographic schemes based on secret sharing

✍ Scribed by XingLan Zhang; DongYao Ji


Publisher
Science in China Press (SCP)
Year
2009
Tongue
English
Weight
493 KB
Volume
52
Category
Article
ISSN
1672-1799

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


On the size of shares for secret sharing
✍ R. M. Capocelli; A. De Santis; L. Gargano; U. Vaccaro πŸ“‚ Article πŸ“… 1993 πŸ› Springer 🌐 English βš– 574 KB

AbstracL A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret, but any nonqualified subset has absolutely no information on the secret. The set of all qualified subsets defines the access structure t

New secret sharing scheme based on linea
✍ Xiaoqing Tan; Zhiguo Wang πŸ“‚ Article πŸ“… 2004 πŸ› SP Editorial Committee of Applied Mathematics - A 🌐 English βš– 364 KB
A realistic security analysis of identif
✍ Poupard, Guillaume πŸ“‚ Article πŸ“… 1997 πŸ› John Wiley and Sons 🌐 English βš– 863 KB

In this paper, we analyze the security of two zero-knowledge identification schemes based on cornbinatorial NP-cornplete problems, PKP (Shamir [3]) and CLE (Stem [5]). We use two different approaches in order to determine, on the one hand, the theoretical limit to the efficiency of the known attacks