首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 734 毫秒
1.
基于 Plücker坐标这一数学中的重要概念,提出一个构造门限秘密共享方案的新方法.该方案不仅是安全的,并且几个著名的线性秘密共享方案都能够由Plücker坐标表示.  相似文献   

2.
给出了构造秘密共享方案的一般框架,同时给出了一个结构简单、易于操作的具体方案.  相似文献   

3.
提出了一种新的基于椭圆曲线密码体制的(t,n)动态秘密共享方案。该方案具有以下特点:参与者能自主选择子密钥;在进行一次秘密恢复后,不会泄露关于子密钥的任何信息,子密钥仍可用恢复于下一个共享的秘密;参与者的子密钥可定期更新,且更新工作由每个参与者独立完成。与传统的多秘密共享方案相比,该方案具有更高的安全性和灵活性。  相似文献   

4.
采用博弈论的方法,提出一种新的理性秘密共享方案.该方案具有以下特点:基于椭圆曲线密码体制,能检验出分发者和参与者的欺骗行为;在密钥重构阶段,不需要可信者参与;将真秘密放在一系列假秘密之中,参与者不知当前轮是否是测试轮;参与者偏离协议不如遵守协议的收益大,理性的参与者有动机遵守协议;最终每位参与者公平地得到秘密.分析表明方案是简单、公平和有效的.  相似文献   

5.
给出了构造秘密共享方案的一般框架 ,同时给出了一个结构简单、易于操作的具体方案  相似文献   

6.
对一个理性秘密共享方案进行分析,发现此方案有两个问题:如果参与者进行欺骗,那么欺骗者能够以23的概率欺骗成功;秘密恢复阶段,参与者不能验证对方出示的子密钥是否正确,可能存在欺骗行为。对此,我们对方案进行了改进,新的方案能够解决上述问题。  相似文献   

7.
本文提出了一种动态的梯形秘密共享方案,它采用了Shamir和Blundo的思想,对现有的李艳俊等人的方案进行了改进,并且在最后加入了多重门限的结合以及更多的相关扩展,使得本方案适用于不同性质和规模的公司企业.  相似文献   

8.
秘密共享体制是适用于保管极其重要信息的一种安全协议,其最大威胁是欺骗攻击,构造抗欺骗攻击的秘密共享体制具有重要意义。本文给出了一种有效构造方法,对于一般的接入结构也可以构造出抗欺骗攻击的体制,并且利用纠错编码的思想,使得体制的信息率有较大的提高。  相似文献   

9.
彭安杰 《中国科技信息》2010,(16):136-136,146
为了保护密钥的安全性,本文将(t,n)门限秘密共享应用于资料备份中,实现了加密密钥的安全管理。该方案通过加密算法保证了用户备份文件的安全性,备份软件实现了资料的异地备份。  相似文献   

10.
建立了一个公开可验证秘密重新分配模型 ,并提出了一个公开可验证秘密重新分配方案 .这个方案将秘密从 (t1,n1)接入结构分配到 (t2 ,n2 )接入结构 .在对旧的份额和子份额的有效性进行检验后 ,新的分享者能产生有效的新份额 .在此方案中 ,新的分享者能验证其他分享者的子份额的有效性 .  相似文献   

11.
12.
给出了2种基于身份的类环签名方案,在该方案中签名者能够代表他属于的集合,但是,验证者却不能识别哪个成员的签名.对于一个攻击者而言,即使他拥有所有成员的密钥,他也不能决定是哪个成员签名,从而实现了无条件的匿名性.  相似文献   

13.
Polar coordinates quantization of the bivariate Gaussian and other cir- cularly symmetric sources has already been investigated. The schemes quantize the polar coordinates representation of the random variables independently in an attempt to reduce the mean square error below that of an analogous rectangular coordinates quantizer. It has been shown for the Gaussian case that the polar quantizer outperforms the rectangular quantizer when the number of levels N is large, while for small N, the rectangular form is often better than the polar form. This paper is an investigation of the optimality of polar quantizers with the subsequent development of optimal circularly symmetric quantizers (labelled Dirichlet polar quantizers).  相似文献   

14.
This paper aims to solve the finite time consensus control problem for spacecraft formation flying (SFF) while accounting for multiple time varying communication delays and changing topologies among SFF members. First, in the presence of model uncertainties and external disturbances, the coupled dynamics of relative position and attitude are derived based on the Lie group SE(3), in which the position and attitude tracking errors with respect to the virtual leader whose trajectory is computed offline are described by exponential coordinates. Then, a nonsingular fast terminal sliding mode (NFTSM) constructed by the exponential coordinates and velocity tracking errors is developed, based on which adaptive fuzzy NFTSM control schemes are proposed to guarantee that the ideal configurations of the SFF members with respect to the virtual leader can be achieved in finite time with high accuracy and all the aforementioned drawbacks can be overcome. The convergence and stability of the closed-loop system are proved theoretically by Lyapunov methods. Finally, numerical simulations are presented to validate the effectiveness and feasibility of the proposed controllers.  相似文献   

15.
A novel visually imperceptible image hiding scheme based on VQ compression and LSB modification is introduced in this article. Multiple secret images can be simultaneously and imperceptibly hid into another cover image with the same image size by the proposed scheme. In order to reduce the volume of secret images to be hid, a codebook is first generated from the secret images and these images are encoded into binary indices by the vector quantization technique. Then the compressed data of secret images are embedded into the VQ codebook used in the encoding procedure by an adaptive least-significant-bits (LSB) modification technique. For the security purpose, the slightly modified codebook is further encrypted into a meaningless data stream by the DES cryptosystem. Finally, the encrypted codebook is embedded into the cover image using the greedy LSB modification technique. Simulation results show that the proposed scheme provides a good improvement in the visual quality of the extracted secret images and the cover image at the receiver. In addition, the proposed scheme provides better hiding capacity for the cover image than earlier works.  相似文献   

16.
为弥补现有风险管理理论中风险可能性测度的不足,并为合作技术创新中隐性知识转移引发的商业秘密风险量化管理提供依据,本文对合作技术创新中隐性知识转移引发的商业秘密风险可能性测度特点进行了分析,并选择了证据理论和主观概率作为合作技术创新中隐性知识转移引发的商业秘密风险可能性测度方法,然后,提出了f(Ai)=Bel(Ai)+ (|Ai|/|Θ|) × [pl(Ai) - bel(Ai)]作为合作技术创新中隐性知识转移引发的商业秘密风险可能性测度最终模型,最后给出了一个具体的算例。  相似文献   

17.
乘性单调张成方案(或乘性的线性密钥共享体制)是设计安全多方计算协议的一个重要 工具。本文给出了一个单调张成方案(或线性密钥共享体制)具有乘性的充分必要条件,即通过判断 一个线性方程组是否有解可以确定一个单调张成方案是否具有乘性。作为例子,我们研究了Shamir的 门限密钥共享体制以及带权重的门限密钥共享体制,指出了它们具有乘性时所应具备的条件。  相似文献   

18.
Given the importance of trade secrets to the success of high technology employers and the concurrent responsibility of managers for their protection, the present article reviews the existing trade secret legal environment to identify important issues and principles to guide high tech managers in meeting their responsibility. Based on this review, organizational and human resource management research issues are posed to suggest an agenda for investigating the impact of trade secret law on individual firms, innovation processes in the high technology sector, and the ability to attract and retain knowledge workers engaged in trade secret sensitive jobs.  相似文献   

19.
政府信息公开视野中的工作秘密   总被引:1,自引:0,他引:1  
汪全胜 《情报科学》2006,24(10):1473-1476,1500
工作秘密就是各级国家机关在其公务活动和内部管理中产生的不属于国家秘密而又不宜对外公开的事项,工作秘密范围的不确定性和随意性导致了政府信息公开与保密的界限不清,进行政府信息公开立法就必须对我国的工作秘密进行严格界定与限制。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号