完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLin, Phen-Lan
dc.contributor.authorDunham, James G.
dc.date.accessioned2009-08-23T04:39:31Z
dc.date.accessioned2020-05-25T06:26:15Z-
dc.date.available2009-08-23T04:39:31Z
dc.date.available2020-05-25T06:26:15Z-
dc.date.issued2006-10-31T09:29:14Z
dc.date.submitted1996-12-19
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2969-
dc.description.abstractThe (n,k) block codes are translated into (1,p,r,n) secret sharing schemes in which collusion between players are not permitted. The performance of both linear block codes and random block codes as (1,p,r,n) SSSs in terms of the relationship between reconstructability and privacy;and the trade-off between privacy and resiliency is compared to the performance bounds derived from a secret sharing model GS3. It is demonstrated that linear codes, when viewed as (1,p,r,n) SSSs, can at best achieve one-half of the performance bounds asymptotically. It is also demonstrated t hat the random codes do not have privacy even though they can achieve the capacity of reconstructability and resiliency with high probability for sufficiently large n. Lastly, a hashed random cone (HRC) is presented and shown to achieve the performance bounds asymptotically. Secret Sharing Reconstructability Privacy Resiliency Collusios-nonpermisible (1,p,r,n) SSS secret sharing model Hashed random code HRC
dc.description.sponsorship中山大學,高雄市
dc.format.extent8p.
dc.format.extent726723 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries1996 ICS會議
dc.subject.otherSecret Sharing Schemes
dc.titleBlock Codes for Collusions-Nonpermissible Secret Sharing Systems
分類:1996年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics001996000240.pdf715.89 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。