文件名称:Shamir
-
所属分类:
- 标签属性:
- 上传时间:2012-12-31
-
文件大小:209.5kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
Shamir的(k,n)门限秘密共享方案
Shamir提出秘密共享概念的同时,也分别给出了(k,n)门限秘密共享体制的概念。简单地说,设秘密通过秘密共享算法分发给个成员共享,每一个成员持有一个子密钥也称为影子或秘密碎片,如果满足:
(1)任何不少于k个的合格成员通过所持有的正确的碎片都可以重构。
(2)任何k个以下的成员集都无法重构。
称这种方案为(k,n)门限秘密共享方案,简称为门限方案,k称为方案的门限值。 作为各种秘密共享方案中最简单实用的门限秘密共享方案,(k,n)门限秘密共享方案也是这些方案中最具有代表性和广泛应用的方案。下面简单介绍一下这个方案 -Shamir' s (k, n) threshold secret sharing scheme Shamir proposed the concept of secret sharing, were also given (k, n) threshold secret sharing system concept. Simply set in secret by secret sharing algorithm distributed members share held by every member of a sub-key is also known as the shadow or secret debris, if: (1) any less than k qualified members through the correct fragmentation held can be reconstructed. (2) The members of any k sets can not be reconstructed. This scheme (k, n) threshold secret sharing scheme, referred to as the threshold scheme, k is called the threshold of the program. As secret sharing scheme in the most simple and practical door threshold secret sharing scheme (k, n) threshold secret sharing scheme is also the most representative and widely used programs such programs. Following is a brief look at this program
Shamir提出秘密共享概念的同时,也分别给出了(k,n)门限秘密共享体制的概念。简单地说,设秘密通过秘密共享算法分发给个成员共享,每一个成员持有一个子密钥也称为影子或秘密碎片,如果满足:
(1)任何不少于k个的合格成员通过所持有的正确的碎片都可以重构。
(2)任何k个以下的成员集都无法重构。
称这种方案为(k,n)门限秘密共享方案,简称为门限方案,k称为方案的门限值。 作为各种秘密共享方案中最简单实用的门限秘密共享方案,(k,n)门限秘密共享方案也是这些方案中最具有代表性和广泛应用的方案。下面简单介绍一下这个方案 -Shamir' s (k, n) threshold secret sharing scheme Shamir proposed the concept of secret sharing, were also given (k, n) threshold secret sharing system concept. Simply set in secret by secret sharing algorithm distributed members share held by every member of a sub-key is also known as the shadow or secret debris, if: (1) any less than k qualified members through the correct fragmentation held can be reconstructed. (2) The members of any k sets can not be reconstructed. This scheme (k, n) threshold secret sharing scheme, referred to as the threshold scheme, k is called the threshold of the program. As secret sharing scheme in the most simple and practical door threshold secret sharing scheme (k, n) threshold secret sharing scheme is also the most representative and widely used programs such programs. Following is a brief look at this program
(系统自动生成,下载前可以参看下载内容)
下载文件列表
Shamir秘密共享方案源代码/
Shamir秘密共享方案源代码/Debug/
Shamir秘密共享方案源代码/Debug/shamir.exe
Shamir秘密共享方案源代码/Debug/shamir.ilk
Shamir秘密共享方案源代码/Debug/shamir.obj
Shamir秘密共享方案源代码/Debug/shamir.pch
Shamir秘密共享方案源代码/Debug/shamir.pdb
Shamir秘密共享方案源代码/Debug/vc60.idb
Shamir秘密共享方案源代码/Debug/vc60.pdb
Shamir秘密共享方案源代码/shamir.cpp
Shamir秘密共享方案源代码/shamir.dsp
Shamir秘密共享方案源代码/shamir.dsw
Shamir秘密共享方案源代码/shamir.ncb
Shamir秘密共享方案源代码/shamir.opt
Shamir秘密共享方案源代码/shamir.plg
Shamir秘密共享方案源代码/Debug/
Shamir秘密共享方案源代码/Debug/shamir.exe
Shamir秘密共享方案源代码/Debug/shamir.ilk
Shamir秘密共享方案源代码/Debug/shamir.obj
Shamir秘密共享方案源代码/Debug/shamir.pch
Shamir秘密共享方案源代码/Debug/shamir.pdb
Shamir秘密共享方案源代码/Debug/vc60.idb
Shamir秘密共享方案源代码/Debug/vc60.pdb
Shamir秘密共享方案源代码/shamir.cpp
Shamir秘密共享方案源代码/shamir.dsp
Shamir秘密共享方案源代码/shamir.dsw
Shamir秘密共享方案源代码/shamir.ncb
Shamir秘密共享方案源代码/shamir.opt
Shamir秘密共享方案源代码/shamir.plg
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.