1) monotone span programs secret sharing

MSP秘钥共享方案
2) secret sharing scheme

秘密共享方案
1.
Another threshold secret sharing scheme based on special access right;

基于特殊权限的另一门限秘密共享方案
2.
This paper presents a distributed password authenticated key exchange protocol based on (t, n)-threshold secret sharing scheme, in which a set of t servers jointly realizes the identification, whereas any conspiracy of fewer servers gains no information about the verification data.
用户口令的验证密钥通过秘密共享方案在服务器组内进行分配,验证任务需要t个服务器协调来完成,任意t-1个服务器合谋无法获得诚实服务器关于口令验证的任何信息。
3.
Generally,we just research on(n,t) secret sharing scheme.

在秘密共享案中,一般研究(n,t)门限秘密共享方案。
3) Shamir secret sharing scheme

Shamir秘密共享方案
1.
Audio watermarking algorithm based on Shamir secret sharing scheme and zero-watermark s technology;
基于Shamir秘密共享方案和零水印的音频水印算法
5) Visual secret sharing scheme

可视秘密共享方案
1.
Most recent papers about binary visual cryptography schemes are dedicated to study a higher contrast of recovered images or a smaller share size in visual secret sharing schemes.
目前提出的许多关于二值可视密码方案的论文都致力于研究在可视秘密共享方案里如何使像素扩展比较小或恢复图像的对比度比较高的问题。
6) threshold secret sharing

门限秘密共享方案
1.
Another threshold secret sharing scheme based on special access right;

基于特殊权限的另一门限秘密共享方案
2.
In this article,we will show(m+n,t1+t2) threshold secret sharing,which is an generalized scheme of(n,t) secret sharing,and we will give(m+n,t1+t2) threshold secret sharing schemes based on difference and Shamir scheme of special access right.
在秘密共享案中,一般研究(n,t)门限秘密共享方案。
补充资料:秘钥
1.隐秘的锁键。比喻奥秘之处。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条