SECRET KEY SHARING SCHEME BASED ON THE THEORY OF ALGEBRAIC SEMIGROUPS

来源 :Journal of Electronics(China) | 被引量 : 0次 | 上传用户:asfaweawrv
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
How to distribute a secret key information to n authorized departments, denoted as: S1, S2,…, Sn, respectively. For every autherized department Si(i = 1,2,… ,n), there are qi authorized persons, and every authorized person has the same secret key informat
其他文献
Mode matching is used for the analysis of monopole antenna on circular disc, which is achieved by developing a novel model consisting of two artificial ground p
砂型铸造工艺制备了BTMCr20港机衬板,对衬板的低温回火组织和性能进行了研究。研究表明,BTMCr20衬板的平均硬度为62HRC,冲击韧性为3 J/cm2,室温组织为回火马氏体、碳化物和残
This paper studies the speckle reduction in multi-look polarimetric synthetic aperture radar (SAR) image. A multi-look polarimetric whitening filtering (MPWF) m
摘 要:本文介绍了“信息素养”认知的三个层面,并从分析“领进门”,“个性塑造”,“信息文化内化”三个方面入手,根据信息技术课的特点,提出在信息技术教学设计中提高学生信息素养的方法。  关键词:信息素养 “领进门” “个性塑造” “信息文化内化”  中图分类号:G420文献标识码:A文章编号:1674-098X(2011)10(c)-0183-01  1 第一个层面:“领进门”的层面  就是说
In this letter, an improved three-step search algorithm is presented, which uses both gray and chromatic information to boost the performance with random optimi
在"一带一路"的大框架之下,我国各项工程建设加快了速度,其中尤其以西北的水利、交通、轨道建设方面收效显著。以甘肃省为例,为加快完成"6363"水利保障行动方案和甘肃省政府要求
This letter proposes a time-domain volume integral equation based method for analyzing the transient scattering from a 2D inhomogeneous cylinder by involking th
In this letter a new skeletonization algorithm is proposed. It combines techniques of fast construction of Euclidean Distance Maps(EDMs), ridge extraction, Hit-
The binary extended Golay code has a two-level structure, which can be used in the decoding of the code. However, such structure is not limited to the Golay cod
建筑物的暖气、冷气和照明方面的能源消耗占全世界2/3,而且会造成大量能源浪费和环境污染,是全球变暖的主因,因此未来的建筑物必须更加的节能环保。空气胶、混合太阳能照明系