Netinfo Security ›› 2016, Vol. 16 ›› Issue (5): 15-22.doi: 10.3969/j.issn.1671-1122.2016.05.003
• Orginal Article • Previous Articles Next Articles
Zhihui LI(), Tingting XU, Na ZHANG
Received:
2016-03-21
Online:
2016-05-20
Published:
2020-05-13
CLC Number:
Zhihui LI, Tingting XU, Na ZHANG. The Construction of a Type of Ideal Access Structures[J]. Netinfo Security, 2016, 16(5): 15-22.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2016.05.003
[1] | ARPITA M.A Resilient Quantum Secret Sharing Scheme[J]. International Journal of Theoretical Physics, 2015, 54(2) : 398-408. |
[2] | LAI Hong.Dynamic (2,3) Threshold Quantum Secret Sharing of Secure Direct Communication[J].Communications in Theoretical Physics, 2015, 63(4) : 459-465. |
[3] | TAVAKOLI A, HERBAUTS I, ŻUKOWSKI M, et al.Secret Sharing with a Single d-level Quantum System[EB/OL].. |
[4] | ZHANG Xiaoqian, TAN xiaoqing, LIANG Cui.High Efficient Multi-party Quantum Secret Sharing Scheme[C] //IEEE.International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, November 8-10, 2014. Guangdong,China.NJ:IEEE, 2014:245-250. |
[5] | 宋云,李志慧,李永明.极小特权数组上的理想的多秘密共享方案[J].中国科学:信息科学,2014,44(5):610-622. |
[6] | SHAMIR A.How to Share a Secret[J]. Communications of the ACM, 1979, 24(11): 612-613. |
[7] | BRICKELL E F.Some Ideal Secret Sharing Schemes[J]. Journal of Combinatorial Mathematics and Combinatorial Computing, 1989(9):105-113. |
[8] | DOUGLAS R Stinson著.密码学原理与实践(第三版)[M].冯登国,等译.北京:电子工业出版社,2008. |
[9] | MASSEY J L. Minimal Codewords and Secret Sharing[EB/OL]. https://www.researchgate. net/publication/2241774_Minimal_Codewords_and_Secret_Sharing, 2016-01-15. |
[10] | 宋云,李志慧,李永明.基于极小线性码上的秘密共享方案[J]. 电子学报,2013,41(2):220-226. |
[11] | SPIEZ S, URBANOWECZ J, ZABLOCKI A.On Constructing Privileged Coalitions in Shamir’s Type Scheme[J]. Finite Fields Applications, 2013 (19) : 73-85. |
[12] | SCHINZEL A, SPIEZ S, URBANOWECZ J.Adimissible Tracks in Shamir's Scheme[J]. Finite Fields Applications, 2010(16):449-462. |
[13] | SPIEZ S, TIMOFEEV A, URBANOWECZ J.Non-adimissible Tracks in Shamir's Scheme[J]. Finite Fields Applications, 2011(17):329-342. |
[14] | LAI Chunpong, DING Cunsheng.Several Generalizations of Shamir’s Secret Sharing Scheme[J]. International Journal of Foundations of Computer Science, 2004, 15(2): 445-458. |
[15] | CLEVE R, GOTTESMAN D, LO HK.How to Share a Quantum Secret[J]. Phys Rev Lett, 1999(83):648-651. |
[16] | DANIEL GOTTESMAN.Theory of Quantum Secret Sharing[J]. Physical Review A,2000,61(4):042311. |
[17] | 吴华,王向斌,潘建伟. 量子通信现状与展望[J]. 中国科学,2014,44(3):296-311. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||