A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Ziba Eslami,et al. Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..
[3] Chin-Chen Chang,et al. An on-line secret sharing scheme for multi-secrets , 1998, Comput. Commun..
[4] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[7] L. Washington. Elliptic Curves: Number Theory and Cryptography , 2003 .
[8] Shiuh-Jeng Wang,et al. Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC , 2011, Wirel. Pers. Commun..
[9] Keith M. Martin,et al. On Sharing Many Secrets (Extended Abstract) , 1994, ASIACRYPT.
[10] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[11] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[12] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[13] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[14] Zhenfu Cao,et al. A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..
[15] Chen Wei,et al. A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps , 2007, 2007 International Conference on Parallel Processing Workshops (ICPPW 2007).
[16] N. Koblitz. Introduction to Elliptic Curves and Modular Forms , 1984 .
[17] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[18] Hyang-Sook Lee. A self-pairing map and its applications to cryptography , 2004, Appl. Math. Comput..
[19] Rong Zhao,et al. A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.