一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

分布式密碼的體系結(jié)構(gòu)和研究內(nèi)容

王磊 祝躍飛

王磊, 祝躍飛. 分布式密碼的體系結(jié)構(gòu)和研究內(nèi)容[J]. 電子與信息學(xué)報, 2005, 27(1): 146-149.
引用本文: 王磊, 祝躍飛. 分布式密碼的體系結(jié)構(gòu)和研究內(nèi)容[J]. 電子與信息學(xué)報, 2005, 27(1): 146-149.
Wang Lei, Zhu Yue-fei. Framework and Researching Content of Distributed Cryptography[J]. Journal of Electronics & Information Technology, 2005, 27(1): 146-149.
Citation: Wang Lei, Zhu Yue-fei. Framework and Researching Content of Distributed Cryptography[J]. Journal of Electronics & Information Technology, 2005, 27(1): 146-149.

分布式密碼的體系結(jié)構(gòu)和研究內(nèi)容

Framework and Researching Content of Distributed Cryptography

  • 摘要: 通過分析分布式密碼各部分的歷史淵源和相互聯(lián)系,給出了分布式密碼的體系結(jié)構(gòu),并對系統(tǒng)模型進行了較為完整的描述。結(jié)合密碼學(xué)研究的基本思路和分布式密碼的現(xiàn)狀,指出了分布式密碼的研究內(nèi)容。
  • Shamir A. How to share a secret[J].Communications of the ACM.1979, 22(11):612-[2]Blakley G R. Safeguarding cryptographic keys[C][J].Proc.National Computer Conference79, AFIPS Proceedings.1979,vol.48:313-[3]Ito M, Saito A, Nishizeki T. Secret sharing scheme realizing general access structure[C]. IEEE Globcom87, Tokyo Japan,1987:99 - 102.[4]Desmedt Y. Society and group oriented cryptography: a new concept[C]. Proc. of CRYPTO87, California USA, 1988:120- 127.[5]Desmedt Y, Frankel Y. Threshold cryptosystems[C]. Proc. of CRYPTO89, California USA, 1 990:307 - 315.[6]Chor B, Goldwasser S, Micali S, Awerbuch B. Verifiable secret sharing and achieving simultaneity in the presence of faults[C].Proc. of IEEE 26-th Annual Symp. on FOCS, Portland, Oregon,1985:383 - 395.[7]Yao A C. Protocols for secure computations[C]. Proc. 23rd Ann.Symp. on Foundations of Computer Science, California USA,1982: 160- 164.[8]Goldreich O. Secure Multi-party Computation. http:∥ www.wisdom.weizmann.ac.il~oded.[9]Canetti R. Studies in secure multiparty computation and applications[D]. [Ph.D. thesis], Weizmann Institute of Science,1995.[10]Desmedt Y.[J].Wang Y. Perfectly secure message transmission revisited[C]. Proc. of EUROCRYPT02, Amsterdam, the Netherlands.2002,:-[11]Hirt M, Maurer U. Player simulation and general adversary structures in perfect multiparty computation[J].Journal of Cryptology.2000, 13(1):31-[12]Karchmer K., Wigderson A. On span programs[C]. Proc. of 8-th Annual Structure in IEEE Complexity Theory Conference, 1993:102- 111.[13]Stanislaw J. Efficient threshold cryptosystems[D]. [PH.D. thesis],MIT, 2001.[14]Catalano D.[J].Gennaro R, Halevi S. Computing inverses over a shared secret modulus[C]. Proc. of EUROCRYPT02,Amsterdam, the Netherlands.2002,:-[15]Algesheimer J, Camenisch J, Shoup V. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. http:∥eprint. iacr. org/2002 - 029.[16]Cramer R.[J].Fehr S. Optimal black-box secret sharing over arbitrary Abelian groups[C]. Proc. of CRYPTO02, California,USA.2002,:-[17]Cramer R.[J].Fehr S, Ishai Y, Kushilevitz K. Efficient multi-party computation over rings[C]. Proc. of EUROCRYPT03, Warsaw,Poland.2003,:-
  • 加載中
計量
  • 文章訪問數(shù):  2687
  • HTML全文瀏覽量:  122
  • PDF下載量:  976
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2003-07-25
  • 修回日期:  2004-04-12
  • 刊出日期:  2005-01-19

目錄

    /

    返回文章
    返回