{"title":"一种高效的(t, n)阈值多秘密共享方案","authors":"Shi Runhua, Huang Liusheng, Zhong Hong","doi":"10.1109/WKDD.2008.126","DOIUrl":null,"url":null,"abstract":"An efficient (t, n) threshold multi-secret sharing scheme is proposed in this paper. This scheme has the same power as Yang et al. 's scheme, in which there are p (p > 1) secrets to be shared among n participants according to (t, n)-threshold access structure. But it uses the fixed ( t -1 )th degree Lagrange interpolation polynomial whenever p les t or p > t while Yang et al.' scheme employs the (t-1), (p-1)th degree Lagrange interpolation polynomial when p les t, p > t, respectively. Thus, the computing time and the storage cost of this scheme is less than that of Yang et al.'s scheme.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme\",\"authors\":\"Shi Runhua, Huang Liusheng, Zhong Hong\",\"doi\":\"10.1109/WKDD.2008.126\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An efficient (t, n) threshold multi-secret sharing scheme is proposed in this paper. This scheme has the same power as Yang et al. 's scheme, in which there are p (p > 1) secrets to be shared among n participants according to (t, n)-threshold access structure. But it uses the fixed ( t -1 )th degree Lagrange interpolation polynomial whenever p les t or p > t while Yang et al.' scheme employs the (t-1), (p-1)th degree Lagrange interpolation polynomial when p les t, p > t, respectively. Thus, the computing time and the storage cost of this scheme is less than that of Yang et al.'s scheme.\",\"PeriodicalId\":101656,\"journal\":{\"name\":\"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WKDD.2008.126\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WKDD.2008.126","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme
An efficient (t, n) threshold multi-secret sharing scheme is proposed in this paper. This scheme has the same power as Yang et al. 's scheme, in which there are p (p > 1) secrets to be shared among n participants according to (t, n)-threshold access structure. But it uses the fixed ( t -1 )th degree Lagrange interpolation polynomial whenever p les t or p > t while Yang et al.' scheme employs the (t-1), (p-1)th degree Lagrange interpolation polynomial when p les t, p > t, respectively. Thus, the computing time and the storage cost of this scheme is less than that of Yang et al.'s scheme.