Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme

作者: Grant Stewart Goodes , Philip Alan Eisen , Michael James Wiener , James Muir

DOI:

关键词:

摘要: A secure and fault-tolerant, or variation-tolerant, method system to turn a set of N shares into an identifier even when only M from this have correct value. secret sharing algorithm is used generate number candidate identifiers subsets associated with asset parameters collection assets. The most frequently occurring then determined be the final identifier. has particular applicability in fields node locking fingerprinting.

参考文章(10)
Aidan T. Hughes, David Barnaby Pearce, Hardware ID to prevent software piracy ,(2001)
Robert A. Knee, Michael L. Craner, Jon P. Radloff, Joshua Berry, Michael D. Ellis, Systems and methods for using playlists ,(2011)
Paulus Mathias Hubertus Mechtildis Antonius Gorissen, Wilhelmus Petrus Adrianus Johannus Michiels, Method and system for obfuscating a cryptographic function ,(2007)
James P. Schneider, Sharing a secret with modular inverses ,(2009)
Norikazu Hosaka, 範和 保坂, Shinichi Matsukawa, 伸一 松川, Data processor, data processing method and data processing program ,(2006)