密码共享相关论文
Based on Shamir' s secret sharing, a (t, n)multi-secret sharing scheme is proposed in this paper. p secrets can be s......
Based on the difficulty of solving the ECDLP (elliptic curve discrete logarithm problem) on the finite field,we present ......
IT部门明白密码保护是组织中最大的安全问题之一。很多时候最终用户并不清楚安全的重要性,他们会共享或者没有很好地保护他们的密码......
By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous pa......