Please use this identifier to cite or link to this item:
|Title:||Secret-sharing with a class of ternary codes||Authors:||Kohel, David R.
|Keywords:||DRNTU::Engineering::Computer science and engineering::Data::Coding and information theory||Issue Date:||2000||Source:||Ding, C., Kohel, D. R., & Ling, S. (2000). Secret-sharing with a class of ternary codes. Theoretical Computer Science, 246(1-2), 285-298.||Series/Report no.:||Theoretical computer science||Abstract:||Secret-sharing is an important topic of cryptography and has applications in information security. One approach to the construction of secret-sharing schemes is based on error-correcting codes. In this paper, we describe a secret-sharing scheme based on a class of ternary codes (Ding et al. IEEE Trans. Inform. Theory IT-46 (2000) 280–284). We determine the access structure and prove properties of the secret-sharing scheme.||URI:||https://hdl.handle.net/10356/96090
|ISSN:||0304-3975||DOI:||http://dx.doi.org/10.1016/S0304-3975(00)00207-3||Rights:||© 2000 Elsevier Science B.V. This is the author created version of a work that has been peer reviewed and accepted for publication by Theoretical Computer Science, Elsevier Science B.V. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1016/S0304-3975(00)00207-3].||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||SPMS Journal Articles|
Files in This Item:
|20. Secret sharing with a class of ternary codes.pdf||186.53 kB||Adobe PDF|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.