Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps
暂无分享,去创建一个
Mohammad Sayad Haghighi | Hadi Khanmohammadi | Mohammad Hesam Tadayon | M. S. Haghighi | M. Tadayon | H. Khanmohammadi
[1] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[2] Ernest F. Brickell,et al. On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.
[3] Wang Aimin,et al. A multi-secret sharing scheme with general access structures based on elliptic curve , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[4] Hyang-Sook Lee. A self-pairing map and its applications to cryptography , 2004, Appl. Math. Comput..
[5] N. Koblitz. Introduction to Elliptic Curves and Modular Forms , 1984 .
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Keith M. Martin,et al. On Sharing Many Secrets (Extended Abstract) , 1994, ASIACRYPT.
[8] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[9] Juan Qu,et al. A practical dynamic multi-secret sharing scheme , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[10] Jacques Stern,et al. Sharing Decryption in the Context of Voting or Lotteries , 2000, Financial Cryptography.
[11] Chin-Ling Chen,et al. The design of a secure anonymous Internet voting system , 2004, Comput. Secur..
[12] Ziba Eslami,et al. A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps , 2012, Wirel. Pers. Commun..
[13] Shiuh-Jeng Wang,et al. Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC , 2011, Wirel. Pers. Commun..
[14] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[15] Yu-Min Wang,et al. A New (t, n) Multi-Secret Sharing Scheme , 2005, 2008 International Conference on Computer and Electrical Engineering.
[16] Rong Zhao,et al. A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.
[17] Jianzhong Zhang,et al. A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme , 2005, CIS.
[18] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[19] L. Washington. Elliptic Curves: Number Theory and Cryptography , 2003 .
[20] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[21] Massoud Hadian Dehkordi,et al. An efficient threshold verifiable multi-secret sharing , 2008, Comput. Stand. Interfaces.
[22] G. Szegő. Zeros of orthogonal polynomials , 1939 .
[23] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[24] Feng Wang,et al. A secret sharing scheme based on Near-MDS codes , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.