نوع مقاله : مقاله پژوهشی
نویسندگان
1 دانشجوی دکتری گروه ریاضی، واحد خرم آباد، دانشگاه آزاد اسلامی، خرم آباد، ایران
2 دانشیار، دانشکده و پژوهشکده فناوری اطلاعات و ارتباطات، دانشگاه جامع امام حسین (ع)، تهران،ایران
3 استادیار گروه ریاضی، واحد خرم آباد، دانشگاه آزاد اسلامی، خرمآباد، ایران
4 دانشیار، پژوهشکده علوم اطلاعات، پژوهشگاه علوم و فناوری اطلاعات ایران (ایرانداک)، تهران، ایران
چکیده
کلیدواژهها
موضوعات
عنوان مقاله [English]
نویسندگان [English]
The Secret sharing is one of the fascinating topics of cryptography, which is widely used in information security. The aim of secret sharing is a process in which one or more secrets are shared between a number of qualified participants or with different credentials. In times when there is a need to recover a secret, a number of people, whom we call authorized people, collect their shares to recover the desired secret. So far, various types of secret sharing schemes based on interpolation have been proposed. In these secret sharing plans, different interpolations have been used, depending on the structural needs of the plan. In this article, some secret sharing schemes based on interpolation are introduced and reviewed. Then by analyzing and comparing the characteristics of these schemes, we conclude that the two secret sharing schemes based on Berkhoff interpolation have better efficiency than the other reviewed schemes.
کلیدواژهها [English]