Guo Yuanbo, Ma Jianfeng, Wang Yadi. An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures[J]. Journal of Computer Research and Development, 2005, 42(5): 877-882.
Citation:
Guo Yuanbo, Ma Jianfeng, Wang Yadi. An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures[J]. Journal of Computer Research and Development, 2005, 42(5): 877-882.
Guo Yuanbo, Ma Jianfeng, Wang Yadi. An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures[J]. Journal of Computer Research and Development, 2005, 42(5): 877-882.
Citation:
Guo Yuanbo, Ma Jianfeng, Wang Yadi. An Efficient Secret Sharing Scheme Realizing Graph-Based Adversary Structures[J]. Journal of Computer Research and Development, 2005, 42(5): 877-882.
1(The Ministry of Education Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071) 2(School of Electronic Technology, I nformation Engineering University of PLA, Zhengzhou 450004) 3(School of Computi ng and Automatization, Tianjin Polytechnic University, Tianjin 300160)
Most of the existing secret sharing schemes are constructed to realize general access structure, which is defined in term of authorized groups of participants, and is unable to be applied directly to the design of an intrusion tolerant syst em. Instead, the generalized adversary structure, which specifies the corruptibl e subsets of participants, can be determined directly by exploiting the system s etting and the attributes of all participants. An efficient secret sharing schem e realizing graph-based adversary structures is proposed. The scheme requires le ss computational costs and storage overhead than the existing ones. Furthermore, it is proved that the scheme satisfy both the required properties of the secret sharing scheme, i.e., the reconstruction property and the perfect property.
Feng Aimin, Xue Hui, Liu Xuejun, Chen Songcan, Yang Ming. Enhanced One-Class SVM[J]. Journal of Computer Research and Development, 2008, 45(11): 1858-1864.