頁籤選單縮合
| 題 名 | Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System |
|---|---|
| 作 者 | Wang, Shiuh-jeng; Tsai, Yuh-ren; Chen, Pin-you; | 書刊名 | Journal of Computers |
| 卷 期 | 19:1 2008.04[民97.04] |
| 頁 次 | 頁29-38 |
| 分類號 | 448.6 |
| 關鍵詞 | Threshold secret sharing; Proactive secret sharing; Sharing polynomial; Decision-making; Distributed certificate authority; |
| 語 文 | 英文(English) |
| 英文摘要 | A secret sharing scheme protects the secret by distributing it to a group of participants (nodes), and it allows for some groups of participants to collaborate together to reconstruct this secret. With regard to the (k, n) threshold scheme, k out of n or more participants can reconstruct the secret. The proactive secret sharing scheme periodically updates the distributed secret (shadow). Based on such a proactive secret sharing scheme, we propose a completely mobile proactive secret sharing scheme, which not only allows for the changing of participant number n, but also arbitrarily changes the threshold k. Furthermore, we apply our technical idea to a specified project exploitation in the real commerce transaction systems to fulfill a trust-based delivery. |
本系統中英文摘要資訊取自各篇刊載內容。