A practical verifiable multi-secret sharing scheme
暂无分享,去创建一个
Rong Zhao | Jian-jie Zhao | Jianzhong Zhang | Rong Zhao | Jian-jie Zhao | Jianzhong Zhang | Jian-jie Zhao
[1] Dieter Gollmann,et al. Secret Sharing with Reusable Polynomials , 1997, ACISP.
[2] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[3] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[4] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[8] Zhenfu Cao,et al. A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..
[9] Chin-Chen Chang,et al. An on-line secret sharing scheme for multi-secrets , 1998, Comput. Commun..
[10] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[11] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[12] L. Harn. Efficient sharing (broadcasting) of multiple secrets , 1995 .