Analisis Perbandingan Skema Pembagian Rahasia Untuk Struktur Akses dan Struktur Terlarang Berdasarkan Graf
Main Authors: | Retno Indah, author, Add author: Kiki Ariyanti Sugeng, supervisor, Add author: Djati Kerami, examiner, Add author: Sri Mardiyati, examiner |
---|---|
Format: | Masters Bachelors |
Terbitan: |
, 2009
|
Subjects: | |
Online Access: |
https://lib.ui.ac.id/detail?id=20252396 |
ctrlnum |
20252396 |
---|---|
fullrecord |
<?xml version="1.0"?>
<dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><type>Thesis:Masters</type><title>Analisis Perbandingan Skema Pembagian Rahasia Untuk Struktur Akses dan Struktur Terlarang Berdasarkan Graf</title><creator>Retno Indah, author</creator><creator>Add author: Kiki Ariyanti Sugeng, supervisor</creator><creator>Add author: Djati Kerami, examiner</creator><creator>Add author: Sri Mardiyati, examiner</creator><publisher/><date>2009</date><subject>Information Rate</subject><description>[Keamanan data terhadap informasi rahasia (secret) smerupakan hal yang
sangat penting, sehingga tidak setiap orang berhak mengakses informasi
rahasia tersebut. Oleh karena itu diperlukan suatu metode yang dapat
digunakan untuk mengatur siapa saja yang berhak mengakses rahasia
tersebut. Salah satu metode yang dapat digunakan adalah skema
pembagian rahasia. Skema pembagian rahasia adalah suatu metode untuk
membagikan potongan-potongan rahasia kepada partisipan sedemikian
sehingga hanya subhimpunan-subhimpunan dari himpunan partisipan
yang memenuhi kualifikasi tertentu yang dapat merekonstruksi rahasia.
Dalam skema pembagian rahasia terdapat skema yang berdasarkan
Struktur Akses dan Struktur Terlarang. Struktur Akses adalah kumpulan
dari subhimpunan-subhimpunan partisipan yang dapat merekonstruksi
rahasia. Sedangkan Struktur Terlarang adalah kumpulan dari
subhimpunan-subhimpunan partisipan yang tidak dapat merekonstruksi
rahasia. Dalam tulisan ini dibandingkan dua jenis skema tersebut yang
berbentuk graf, dilihat dari cara membangun share dan information
ratenya. Berdasarkan graf yang digunakan, tahapan konstruksi pada
skema dengan Struktur Akses lebih sederhana jika dibandingkan dengan
skema dengan Struktur Terlarang. Berdasarkan konstruksi skema maka
dapat disimpulkan kedua skema tersebut bukan skema yang saling
komplemen meskipun representasi grafnya saling komplemen.;Data security of confidential information is something that is very
important, so not everyone has access to such confidential information.
Therefore we need a method that can be used to regulate anyone who has
access the secret. One method that can be used is a secret sharing scheme.
Secret sharing scheme is a method to distribute pieces of the secret to the
participants such that only qualified subsets of the participants that can
reconstruct the secret. In secret sharing schemes are schemes based on
Access Structure and Prohibited Structure. Access Structure is a collection
of subsets of participants that can reconstruct the secret. While the
Prohibited Structure is a collection of subsets of participants who can not
reconstruct the secret. In this paper we compare two types of such
schemes based on graphs, and we see from the process of building the
share and from the information rate. Based on the graph is used, the stages
of construction on the scheme with access structure is simpler than the
scheme with access structure. The two schemes are not complement to
each other, even the graph representations are complement each other.;Data security of confidential information is something that is very
important, so not everyone has access to such confidential information.
Therefore we need a method that can be used to regulate anyone who has
access the secret. One method that can be used is a secret sharing scheme.
Secret sharing scheme is a method to distribute pieces of the secret to the
participants such that only qualified subsets of the participants that can
reconstruct the secret. In secret sharing schemes are schemes based on
Access Structure and Prohibited Structure. Access Structure is a collection
of subsets of participants that can reconstruct the secret. While the
Prohibited Structure is a collection of subsets of participants who can not
reconstruct the secret. In this paper we compare two types of such
schemes based on graphs, and we see from the process of building the
share and from the information rate. Based on the graph is used, the stages
of construction on the scheme with access structure is simpler than the
scheme with access structure. The two schemes are not complement to
each other, even the graph representations are complement each other., Data security of confidential information is something that is very
important, so not everyone has access to such confidential information.
Therefore we need a method that can be used to regulate anyone who has
access the secret. One method that can be used is a secret sharing scheme.
Secret sharing scheme is a method to distribute pieces of the secret to the
participants such that only qualified subsets of the participants that can
reconstruct the secret. In secret sharing schemes are schemes based on
Access Structure and Prohibited Structure. Access Structure is a collection
of subsets of participants that can reconstruct the secret. While the
Prohibited Structure is a collection of subsets of participants who can not
reconstruct the secret. In this paper we compare two types of such
schemes based on graphs, and we see from the process of building the
share and from the information rate. Based on the graph is used, the stages
of construction on the scheme with access structure is simpler than the
scheme with access structure. The two schemes are not complement to
each other, even the graph representations are complement each other.]</description><identifier>https://lib.ui.ac.id/detail?id=20252396</identifier><recordID>20252396</recordID></dc>
|
format |
Thesis:Masters Thesis Thesis:Bachelors |
author |
Retno Indah, author Add author: Kiki Ariyanti Sugeng, supervisor Add author: Djati Kerami, examiner Add author: Sri Mardiyati, examiner |
title |
Analisis Perbandingan Skema Pembagian Rahasia Untuk Struktur Akses dan Struktur Terlarang Berdasarkan Graf |
publishDate |
2009 |
topic |
Information Rate |
url |
https://lib.ui.ac.id/detail?id=20252396 |
contents |
[Keamanan data terhadap informasi rahasia (secret) smerupakan hal yang
sangat penting, sehingga tidak setiap orang berhak mengakses informasi
rahasia tersebut. Oleh karena itu diperlukan suatu metode yang dapat
digunakan untuk mengatur siapa saja yang berhak mengakses rahasia
tersebut. Salah satu metode yang dapat digunakan adalah skema
pembagian rahasia. Skema pembagian rahasia adalah suatu metode untuk
membagikan potongan-potongan rahasia kepada partisipan sedemikian
sehingga hanya subhimpunan-subhimpunan dari himpunan partisipan
yang memenuhi kualifikasi tertentu yang dapat merekonstruksi rahasia.
Dalam skema pembagian rahasia terdapat skema yang berdasarkan
Struktur Akses dan Struktur Terlarang. Struktur Akses adalah kumpulan
dari subhimpunan-subhimpunan partisipan yang dapat merekonstruksi
rahasia. Sedangkan Struktur Terlarang adalah kumpulan dari
subhimpunan-subhimpunan partisipan yang tidak dapat merekonstruksi
rahasia. Dalam tulisan ini dibandingkan dua jenis skema tersebut yang
berbentuk graf, dilihat dari cara membangun share dan information
ratenya. Berdasarkan graf yang digunakan, tahapan konstruksi pada
skema dengan Struktur Akses lebih sederhana jika dibandingkan dengan
skema dengan Struktur Terlarang. Berdasarkan konstruksi skema maka
dapat disimpulkan kedua skema tersebut bukan skema yang saling
komplemen meskipun representasi grafnya saling komplemen.;Data security of confidential information is something that is very
important, so not everyone has access to such confidential information.
Therefore we need a method that can be used to regulate anyone who has
access the secret. One method that can be used is a secret sharing scheme.
Secret sharing scheme is a method to distribute pieces of the secret to the
participants such that only qualified subsets of the participants that can
reconstruct the secret. In secret sharing schemes are schemes based on
Access Structure and Prohibited Structure. Access Structure is a collection
of subsets of participants that can reconstruct the secret. While the
Prohibited Structure is a collection of subsets of participants who can not
reconstruct the secret. In this paper we compare two types of such
schemes based on graphs, and we see from the process of building the
share and from the information rate. Based on the graph is used, the stages
of construction on the scheme with access structure is simpler than the
scheme with access structure. The two schemes are not complement to
each other, even the graph representations are complement each other.;Data security of confidential information is something that is very
important, so not everyone has access to such confidential information.
Therefore we need a method that can be used to regulate anyone who has
access the secret. One method that can be used is a secret sharing scheme.
Secret sharing scheme is a method to distribute pieces of the secret to the
participants such that only qualified subsets of the participants that can
reconstruct the secret. In secret sharing schemes are schemes based on
Access Structure and Prohibited Structure. Access Structure is a collection
of subsets of participants that can reconstruct the secret. While the
Prohibited Structure is a collection of subsets of participants who can not
reconstruct the secret. In this paper we compare two types of such
schemes based on graphs, and we see from the process of building the
share and from the information rate. Based on the graph is used, the stages
of construction on the scheme with access structure is simpler than the
scheme with access structure. The two schemes are not complement to
each other, even the graph representations are complement each other., Data security of confidential information is something that is very
important, so not everyone has access to such confidential information.
Therefore we need a method that can be used to regulate anyone who has
access the secret. One method that can be used is a secret sharing scheme.
Secret sharing scheme is a method to distribute pieces of the secret to the
participants such that only qualified subsets of the participants that can
reconstruct the secret. In secret sharing schemes are schemes based on
Access Structure and Prohibited Structure. Access Structure is a collection
of subsets of participants that can reconstruct the secret. While the
Prohibited Structure is a collection of subsets of participants who can not
reconstruct the secret. In this paper we compare two types of such
schemes based on graphs, and we see from the process of building the
share and from the information rate. Based on the graph is used, the stages
of construction on the scheme with access structure is simpler than the
scheme with access structure. The two schemes are not complement to
each other, even the graph representations are complement each other.] |
id |
IOS18064.20252396 |
institution |
Universitas Indonesia |
institution_id |
51 |
institution_type |
library:university library |
library |
Perpustakaan Universitas Indonesia |
library_id |
492 |
collection |
Repository Skripsi (open) Universitas Indonesia |
repository_id |
18064 |
city |
KOTA DEPOK |
province |
JAWA BARAT |
repoId |
IOS18064 |
first_indexed |
2022-12-13T09:09:09Z |
last_indexed |
2022-12-13T09:09:09Z |
recordtype |
dc |
merged_child_boolean |
1 |
_version_ |
1752197099611488256 |
score |
17.538404 |