Title :
Security decision analysis based on A. Shamir´s (t, n) threshold secret sharing scheme
Author :
Li, Quandong ; Zhou, Yanhui
Author_Institution :
Dept. of Comput. Sci. & Technol., Southwest Univ., Chongqing, China
Abstract :
Decentralized storage for the key can help improving its security. This essay is based on A. Shamir´s threshold key sharing scheme, focus on the influence (the key, subtle and vague) on the security and ease of use for tn value´s selection, added with the third index of the Yager Fuzzy Theory, and combined with the exact value´s complementary judgment matrix, to build a preferred method for the selected alternatives of the strategic decision scheme in the threshold key sharing scheme. The last part of the essay illustrates the feasibility and effectiveness of this method by example.
Keywords :
cryptography; fuzzy set theory; A. Shamir´s threshold key sharing scheme; Yager fuzzy theory; complementary judgment matrix; decentralized storage; security decision analysis; strategic decision scheme; Cryptography; Decision making; Matrix converters; Pragmatics; Servers; Sorting; host security; key decentralizing storage; strategic decision;
Conference_Titel :
Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on
Conference_Location :
Yichang
Print_ISBN :
978-1-4577-1414-6
DOI :
10.1109/CECNet.2012.6202106