(下转第150页)
(上接第143页)
参考文献
[1]Ajtai M.Generating Hard Instances of Lattice Pro-blem[C]//Proceedings of the 28th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,1996:99-106.
[2]Ajtai M.The Shortest Vector Problem in EC is NP-hard for Randomized Reductions[C]//Proceedings of the 30th Annual ACM Symposium on Theory of Com-puting.New York,USA:ACM Press,1998:10-19.
[3]焦栋.门限秘密共享策略及其应用研究[D].大连:大连理工大学,2014.
[4]Boneh D,Franklin M.Idenity-based Encryption from the Weil Pairing[J].SIAM Journal on Computing,2003,32(3):213-229.
[5]Cocks C.AnIdentity Based Encryption Scheme Based on Quadratic Residues[C]//Proceedings of the 8th IMA International Conference.Berlin,Germany:Springer,2001:360-363.
[6]Budurushi J,Neumann S,Olembo M.Pretty Under-standable Democracy——A Secure and Under-standable Internet Voting Scheme[C]//Proceedings of the 8th International Conference on Availability,Reliability and Security.Washington D.C.,USA:IEEE Press,2013:198-207.
[7]Basu A,Sengupta I,Sing J K.Secured Hierarchical Secret Sharing Using ECC Based Sign Cryption[J].Security Communication Networks,2012,5(7):752-763.
[8]Tentu A N,Paul P,Venkaiah V C.Ideal and Perfect Hierarchical Secret Sharing Schemes[EB/OL].(2013-04-02).http://eprint.iacr.org/2013/189.pdf.
[9]Farras O,Padro C.Ideal Hierarchical Secret Sharing Schemes[J].IEEE Transactions on Information Theory,2012,58(5):3273-3286.
[10]焦栋,李明楚,郭成,等.可重用多属性多等级门限秘密共享[J].计算机工程与应用,2014,50(10):7-12.
[11]Bansarkhani R E,Meziani M.An Efficient Lattice-based Secret Sharing Construction[C]//Proceedings of the 6th International Federation for Information Processing.Berlin,Germany:Springer,2012:160-168.
[12]Georgescu A.ALWE-based Secret Sharing Scheme[J].IJCA Special Issue on Network Security and Crypto-graphy,2011,3(6):27-29.
[13]Steinfeld R,Pieprzyk J,Wang H.Lattice-based Threshold Changeability for Standard Shamir Secret-sharing Schemes[J].IEEE Transactions on Information Theory,2007,53(7):2542-2559.
[14]Pakniat N,Noroozi M,Eslami Z.Distributed Key Generation Protocol with Hierarchical Threshold Access Structure[J].IET Information Security,2015,9(4):248-255.
[15]王锋.多策略门限秘密共享研究与应用[D].北京:北京邮电大学,2011.
编辑顾逸斐 |