DocumentCode :
2129931
Title :
Security decision analysis based on A. Shamir´s (t, n) threshold secret sharing scheme
Author :
Li, Quandong ; Zhou, Yanhui
Author_Institution :
Dept. of Comput. Sci. & Technol., Southwest Univ., Chongqing, China
fYear :
2012
fDate :
21-23 April 2012
Firstpage :
2065
Lastpage :
2068
Abstract :
Decentralized storage for the key can help improving its security. This essay is based on A. Shamir´s threshold key sharing scheme, focus on the influence (the key, subtle and vague) on the security and ease of use for tn value´s selection, added with the third index of the Yager Fuzzy Theory, and combined with the exact value´s complementary judgment matrix, to build a preferred method for the selected alternatives of the strategic decision scheme in the threshold key sharing scheme. The last part of the essay illustrates the feasibility and effectiveness of this method by example.
Keywords :
cryptography; fuzzy set theory; A. Shamir´s threshold key sharing scheme; Yager fuzzy theory; complementary judgment matrix; decentralized storage; security decision analysis; strategic decision scheme; Cryptography; Decision making; Matrix converters; Pragmatics; Servers; Sorting; host security; key decentralizing storage; strategic decision;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on
Conference_Location :
Yichang
Print_ISBN :
978-1-4577-1414-6
Type :
conf
DOI :
10.1109/CECNet.2012.6202106
Filename :
6202106
Link To Document :
بازگشت