首页> 外文会议>Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on >Security decision analysis based on A. Shamir's (t, n) threshold secret sharing scheme
【24h】

Security decision analysis based on A. Shamir's (t, n) threshold secret sharing scheme

机译:基于A.Shamir(t,n)门限秘密共享方案的安全决策分析

获取原文
获取原文并翻译 | 示例

摘要

Decentralized storage for the key can help improving its security. This essay is based on A. Shamir's threshold key sharing scheme, focus on the influence (the key, subtle and vague) on the security and ease of use for tn value's selection, added with the third index of the Yager Fuzzy Theory, and combined with the exact value's complementary judgment matrix, to build a preferred method for the selected alternatives of the strategic decision scheme in the threshold key sharing scheme. The last part of the essay illustrates the feasibility and effectiveness of this method by example.
机译:密钥的分散存储可以帮助提高其安全性。本文基于A. Shamir的阈值密钥共享方案,着重于对tn值选择的安全性和易用性的影响(密钥,微妙和模糊),并添加了Yager Fuzzy Theory的第三个索引,并结合了与精确值的互补判断矩阵一起,为阈值密钥共享方案中的战略决策方案的选定替代方案构建首选方法。本文的最后一部分通过实例说明了该方法的可行性和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号