A New Secret Sharing Scheme Based on the Multi-Dealer
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[3] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[4] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[5] L. Harn. Efficient sharing (broadcasting) of multiple secrets , 1995 .
[6] Chin-Chen Chang,et al. A concept of designing cheater identification methods for secret sharing , 1999, J. Syst. Softw..
[7] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[8] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[9] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[10] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[11] Chin-Chen Chang,et al. An on-line secret sharing scheme for multi-secrets , 1998, Comput. Commun..
[12] Tzong-Chen Wu,et al. Cheating detection and cheater identification in secret sharing schemes , 1995 .
[13] W. M. Morse,et al. The Use of Intelligent Modules in Brookhaven FASTBUS , 1985, IEEE Transactions on Nuclear Science.
[14] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[15] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[16] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..