AbstracL A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret, but any nonqualified subset has absolutely no information on the secret. The set of all qualified subsets defines the access structure t
β¦ LIBER β¦
Analysis of a kind of quantum cryptographic schemes based on secret sharing
β Scribed by XingLan Zhang; DongYao Ji
- Publisher
- Science in China Press (SCP)
- Year
- 2009
- Tongue
- English
- Weight
- 493 KB
- Volume
- 52
- Category
- Article
- ISSN
- 1672-1799
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
On the size of shares for secret sharing
β
R. M. Capocelli; A. De Santis; L. Gargano; U. Vaccaro
π
Article
π
1993
π
Springer
π
English
β 574 KB
Secret key sharing scheme based on the t
β
Yongchuan Wang; Zichen Li; Yixian Yang
π
Article
π
2000
π
SP Science Press
π
English
β 286 KB
New secret sharing scheme based on linea
β
Xiaoqing Tan; Zhiguo Wang
π
Article
π
2004
π
SP Editorial Committee of Applied Mathematics - A
π
English
β 364 KB
Improving the security of multiparty qua
β
Song Lin; Qiao-Yan Wen; Fei Gao; Fu-Chen Zhu
π
Article
π
2008
π
Elsevier Science
π
English
β 133 KB
A special attack on the multiparty quant
β
Su-Juan Qin; Fei Gao; Qiao-Yan Wen; Fu-Chen Zhu
π
Article
π
2008
π
Elsevier Science
π
English
β 148 KB
A realistic security analysis of identif
β
Poupard, Guillaume
π
Article
π
1997
π
John Wiley and Sons
π
English
β 863 KB
In this paper, we analyze the security of two zero-knowledge identification schemes based on cornbinatorial NP-cornplete problems, PKP (Shamir [3]) and CLE (Stem [5]). We use two different approaches in order to determine, on the one hand, the theoretical limit to the efficiency of the known attacks