Description: Shamir' s (k, n) threshold secret sharing scheme Shamir proposed the concept of secret sharing, were also given (k, n) threshold secret sharing system concept. Simply set in secret by secret sharing algorithm distributed members share held by every member of a sub-key is also known as the shadow or secret debris, if: (1) any less than k qualified members through the correct fragmentation held can be reconstructed. (2) The members of any k sets can not be reconstructed. This scheme (k, n) threshold secret sharing scheme, referred to as the threshold scheme, k is called the threshold of the program. As secret sharing scheme in the most simple and practical door threshold secret sharing scheme (k, n) threshold secret sharing scheme is also the most representative and widely used programs such programs. Following is a brief look at this program
To Search:
File list (Check if you may need any files):
Shamir秘密共享方案源代码
........................\Debug
........................\.....\shamir.exe
........................\.....\shamir.ilk
........................\.....\shamir.obj
........................\.....\shamir.pch
........................\.....\shamir.pdb
........................\.....\vc60.idb
........................\.....\vc60.pdb
........................\shamir.cpp
........................\shamir.dsp
........................\shamir.dsw
........................\shamir.ncb
........................\shamir.opt
........................\shamir.plg