购买
下载掌阅APP,畅读海量书库
立即打开
畅读海量书库
扫码下载掌阅APP

参考文献

[1] SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.

[2] 刘忆宁.基于秘密分享的信息安全协议[M].西安:西安电子科技大学出版社, 2015.

[3] 杨波.现代密码学(第3版)[M].北京:清华大学出版社, 2015.

[4] ANDERSON R, MOORE T. The economics of information security[J]. Science, 2006, 314(5799):610-613.

[5] ASHAROV G, LINDELL Y. Utility dependence in correct and fair rational secret sharing[C]//Advances in Cryptology - CRYPTO 2009. Berlin: Springer, 2009: 559-576.

[6] CHAN C W, CHANG C C. A scheme for threshold multi-secret sharing[J]. Applied Mathematics and Computation, 2005, 166(1): 1-14.

[7] TIAN Y L, MA J F, PENG C G, et al. A rational framework for secure communication[J]. Information Sciences, 2013, 250: 215-226.

[8] 田有亮,彭长根.基于双线性对的可验证秘密共享方案[J].计算机应用, 2007, 27(S2):125-127.

[9] 田有亮,彭长根.基于双线性对的可验证秘密共享及其应用[J].计算机工程, 2009, 35(10):158-161.

[10] 田有亮,马建峰,彭长根,等.秘密共享体制的博弈论分析[J].电子学报, 2011, 39(12):2790-2795.

[11] 田有亮,马建峰,彭长根,等.椭圆曲线上的信息论安全的可验证秘密共享方案[J].通信学报, 2011, 32(12): 96-102.

[12] 张志芳,刘木兰.理性密钥共享的扩展式博弈模型[J].中国科学:信息科学, 2012, 42(1):32-46.

[13] HALPERN J, TEAGUE V. Rational secret sharing and multiparty computation: extended abstract[C]//Proceedings of the 36th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 2004: 623-632. otSeaiD/BDN+aMTT3K9nqMFIHlgp8VdVyEfm0L55wCitFCCrbBRI1XWAYEK1RJcb

点击中间区域
呼出菜单
上一章
目录
下一章
×