You-sheng Zhou, Feng Wang, Yang Xin, Shoushan Luo, S. Qing, Yixian Yang
{"title":"基于Near-MDS代码的秘密共享方案","authors":"You-sheng Zhou, Feng Wang, Yang Xin, Shoushan Luo, S. Qing, Yixian Yang","doi":"10.1109/ICNIDC.2009.5360821","DOIUrl":null,"url":null,"abstract":"In this paper, we consider the application of Near-MDS codes in cryptography. Near-MDS codes have some important properties that can be used to construct secret sharing schemes. The proposed secret sharing schemes in this paper have good security properties such as cheating detection and cheaters identification when recovering the secret. In addition, the number of participants in our proposed scheme is more than previous results.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"497 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"A secret sharing scheme based on Near-MDS codes\",\"authors\":\"You-sheng Zhou, Feng Wang, Yang Xin, Shoushan Luo, S. Qing, Yixian Yang\",\"doi\":\"10.1109/ICNIDC.2009.5360821\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we consider the application of Near-MDS codes in cryptography. Near-MDS codes have some important properties that can be used to construct secret sharing schemes. The proposed secret sharing schemes in this paper have good security properties such as cheating detection and cheaters identification when recovering the secret. In addition, the number of participants in our proposed scheme is more than previous results.\",\"PeriodicalId\":127306,\"journal\":{\"name\":\"2009 IEEE International Conference on Network Infrastructure and Digital Content\",\"volume\":\"497 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Network Infrastructure and Digital Content\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNIDC.2009.5360821\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Network Infrastructure and Digital Content","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNIDC.2009.5360821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we consider the application of Near-MDS codes in cryptography. Near-MDS codes have some important properties that can be used to construct secret sharing schemes. The proposed secret sharing schemes in this paper have good security properties such as cheating detection and cheaters identification when recovering the secret. In addition, the number of participants in our proposed scheme is more than previous results.