College of Mathematics and informatics, Fujian Normal University, Fuzhou 350117, China; Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China 在期刊界中查找 在百度中查找 在本站中查找
College of Mathematics and informatics, Fujian Normal University, Fuzhou 350117, China; Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China 在期刊界中查找 在百度中查找 在本站中查找
College of Mathematics and informatics, Fujian Normal University, Fuzhou 350117, China; Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China 在期刊界中查找 在百度中查找 在本站中查找
College of Mathematics and informatics, Fujian Normal University, Fuzhou 350117, China; Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China 在期刊界中查找 在百度中查找 在本站中查找
Since the existing function secret sharing schemes require all participants to join in the reconstruction phase. Therefore, it cannot be flexibly applied to real-world scenarios. A function secret sharing scheme with thresholds is constructed in this study using polynomial techniques. According to the security model of function secret sharing, we proved that the proposed scheme has security in the sense of information theory. In addition, this study analyzes the function secret sharing scheme proposed by Yuan et al., and expounds the reason why their scheme does not satisfy the security of function secret sharing. Finally, a comprehensive comparison between the newly constructed scheme and the existing function secret sharing scheme is found. We note that the newly constructed scheme has higher level of security and higher efficiency through the comprehensive comparison.