排序方式: 共有21条查询结果,搜索用时 505 毫秒
1.
Ross Anderson Cunsheng Ding Tor Helleseth Torleiv Klove 《Designs, Codes and Cryptography》1998,15(2):111-124
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes. 相似文献
2.
New constructions of regular disjoint distinct difference sets (DDDS) are presented. In particular, multiplicative and additive DDDS are considered. 相似文献
3.
Torleiv Kløve 《BIT Numerical Mathematics》1972,12(3):342-346
Let(n) be the least integer such thatn may be represented in the formn=x
1
2
+x
2
3
+...+x
(n)
(n)+1 wherex
1,x
2, ...,x
(n) are natural numbers. We computed(n) forn 250 000 and found that(n) 5 for all thesen exceptn=56, 160 for which(n)=6. Also(n) 4 for 41542<n<=250 000. 相似文献
4.
5.
Torleiv Kløve 《BIT Numerical Mathematics》1974,14(1):40-44
We consider the simultaneous equations $$\begin{gathered} p_1^{\alpha _1 } p_2^{\alpha _2 } ...p_n^{\alpha _n } = P_1 P_2 \hfill \\ p_{n + 1} = P_1 - P_2 \hfill \\ \end{gathered} $$ wherep 1,p 2,...,p n+1 are then+1 first primes and α1,...,α n ,P 1,P 2 are integers. The equations are solved completely forn≦3 and all solutions given under certain restrictions on the α i 's forn≦9. 相似文献
6.
The concepts of a linear covering code and a covering set for the limited-magnitude-error channel are introduced. A number of covering-set constructions, as well as some bounds, are given. In particular, optimal constructions are given for some cases involving small-magnitude errors. A problem of Stein is partially solved for these cases. Optimal packing sets and the corresponding error-correcting codes are also considered for some small-magnitude errors. 相似文献
7.
陈文德 《应用数学学报(英文版)》1996,12(1):102-108
CHENWENDE(陈文德)(InstituteofSystemsSciences,theChineseAcademyofSciences,Beijing100080,ChinaandStateKeyLabraryofInformationSecur... 相似文献
8.
9.
The weight hierarchy of a linear [n,k;q] code C over GF(q) is the sequence (d1,d2,...,dk) where dr is the smallest support of an r–dimensional subcode of C. By explicit construction, it is shown that if a sequence (a1,a2,...,ak) satisfies certain conditions, then it is the weight hierarchy of a code satisfying the chain condition. 相似文献
10.
Torleiv Kløve 《Discrete Mathematics》1978,23(2):159-168
We study the weight distribution of the linear codes over GF(ql) which have generator matrices over GF(q) and their dual codes. As an application we find the weight distribution of the irreducible cyclic (23(21≈1), 111) codes over GF(2) for all lnot divisible by 11. 相似文献