• 沒有找到結果。

An efficient construction of perfect secret sharing schemes for graph-based structures

N/A
N/A
Protected

Academic year: 2021

Share "An efficient construction of perfect secret sharing schemes for graph-based structures"

Copied!
7
0
0

加載中.... (立即查看全文)

全文

Loading

數據

Figure  1.  Graph  G  with  six participants.
Figure  2  illustrates  the  communication  granting  protocol.  T h e   following abbreviations  are  used  in  the  protocol

參考文獻

相關文件

• Suppose the input graph contains at least one tour of the cities with a total distance at most B. – Then there is a computation path for

The results contain the conditions of a perfect conversion, the best strategy for converting 2D into prisms or pyramids under the best or worth circumstance, and a strategy

The Secondary Education Curriculum Guide (SECG) is prepared by the Curriculum Development Council (CDC) to advise secondary schools on how to sustain the Learning to

In this talk, we introduce a general iterative scheme for finding a common element of the set of solutions of variational inequality problem for an inverse-strongly monotone mapping

Define instead the imaginary.. potential, magnetic field, lattice…) Dirac-BdG Hamiltonian:. with small, and matrix

Miroslav Fiedler, Praha, Algebraic connectivity of graphs, Czechoslovak Mathematical Journal 23 (98) 1973,

● In computer science, a data structure is a data organization, management, and storage format that enables efficient access and

To decide the correspondence between different sets of fea- ture points and to consider the binary relationships of point pairs at the same time, we construct a graph for each set