Trust Unbalanced Quantum Secret Sharing

碩士 === 國立成功大學 === 資訊工程學系碩博士班 === 98 === Today, information security techniques such as DES, AES, RSA, and ElGamal are based on the cryptography theory. These cryptosystems are computationally secure. The purpose of these cryptosystems is to prevent attackers from breaking them in a certain period of...

Full description

Bibliographic Details
Main Authors: Cheng-ChiehHwang, 黃正傑
Other Authors: Tzone-lih Hwang
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/09215692321852071044