完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lin, Phen-Lan | |
dc.date.accessioned | 2009-08-23T04:39:18Z | |
dc.date.accessioned | 2020-05-25T06:25:10Z | - |
dc.date.available | 2009-08-23T04:39:18Z | |
dc.date.available | 2020-05-25T06:25:10Z | - |
dc.date.issued | 2006-10-31T09:13:12Z | |
dc.date.submitted | 1996-12-19 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/2942 | - |
dc.description.abstract | A unified mode US2 which contains a pair of encoder-decoder and a channel is presented to emulate the secret sharing systems of various schemes. Depending on collusion is permitted or not in the particular system, the encoder-decoder pair and channel vary. The channel for collusion-nonpermissible US2 is developed. Its capacity is derived and used to establish the bounds on the (1,p,r,n) secret sharing scheme. The channel and a possible coding scheme in investigated as well for US2 which allows players collude. Secret sharing scheme (t,n) threshold scheme (1,p,r,n) secret sharing scheme non-systematic linear code Reed-Solomon code t-private t-resilient code Reed-Solomon code t-private t-resilient collusion-permissible secret sharing model collusion-nonpermissible secret sharing model | |
dc.description.sponsorship | 中山大學,高雄市 | |
dc.format.extent | 6p. | |
dc.format.extent | 556572 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 1996 ICS會議 | |
dc.subject.other | Secret Sharing Schemes | |
dc.title | A Unified Model for Collusion-Permissible and Nonpermissible Secret Sharing Systems | |
分類: | 1996年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics001996000241.pdf | 543.53 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。