Fair hierarchical secret sharing scheme based on smart contract
暂无分享,去创建一个
Siu-Ming Yiu | En Zhang | Ming Li | Jiao Du | Jun-Zhe Zhu | Gang-Gang Jin | S. Yiu | E. Zhang | J. Du | Ming Li | Jun-Zhe Zhu | Ganggang Jin
[1] Urszula Ogiela,et al. Visual CAPTCHA application in linguistic cryptography , 2018, Concurr. Comput. Pract. Exp..
[2] Changyu Dong,et al. Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing , 2017, CCS.
[3] Ching-Nung Yang,et al. Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD , 2018, J. Vis. Commun. Image Represent..
[4] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[7] Carles Padró,et al. Ideal Hierarchical Secret Sharing Schemes , 2010, IEEE Transactions on Information Theory.
[8] En Zhang,et al. Rational Multi-Secret Sharing Scheme in Standard Point-to-Point Communication Networks , 2013, Int. J. Found. Comput. Sci..
[9] Saikrishna Badrinarayanan,et al. Revisiting Non-Malleable Secret Sharing , 2019, IACR Cryptol. ePrint Arch..
[10] Yanjiao Chen,et al. CReam: A Smart Contract Enabled Collusion-Resistant e-Auction , 2019, IEEE Transactions on Information Forensics and Security.
[11] Lein Harn,et al. Fair secret reconstruction in (t, n) secret sharing , 2015, J. Inf. Secur. Appl..
[12] Dongdai Lin,et al. Bayesian mechanism for rational secret sharing scheme , 2015, Science China Information Sciences.
[13] Ming Li,et al. Outsourcing secret sharing scheme based on homomorphism encryption , 2018, IET Inf. Secur..
[14] Vipul Goyal,et al. Non-malleable secret sharing , 2018, IACR Cryptol. ePrint Arch..
[15] Tamir Tassa,et al. Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.
[16] Marek R. Ogiela,et al. Insider Threats and Cryptographic Techniques in Secure Information Management , 2017, IEEE Systems Journal.
[17] Ching-Nung Yang,et al. Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes , 2018, Signal Process. Image Commun..
[18] Yanhong Liu,et al. Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..
[19] Marek R. Ogiela,et al. Security of visual codes in service management in the cloud , 2017, 2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS).
[20] Yali Liu,et al. Double verification protocol via secret sharing for low-cost RFID tags , 2019, Future Gener. Comput. Syst..
[21] Ziba Eslami,et al. Distributed key generation protocol with hierarchical threshold access structure , 2015, IET Inf. Secur..
[22] P ArockiaJansiRani,et al. Hierarchical threshold secret sharing scheme for color images , 2017 .
[23] Brad A. Myers,et al. Smarter Smart Contract Development Tools , 2019, 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[24] Peiyan Yuan,et al. Verifiable Rational Secret Sharing Scheme in Mobile Networks , 2015, Mob. Inf. Syst..
[25] Taraneh Eghlidos,et al. An Efficient Lattice Based Multi-Stage Secret Sharing Scheme , 2017, IEEE Transactions on Dependable and Secure Computing.
[26] Zhihui Li,et al. A dynamic multiparty quantum direct secret sharing based on generalized GHZ states , 2018, Quantum Inf. Process..
[27] Fenghua Li,et al. Server-aided private set intersection based on reputation , 2017, Inf. Sci..
[28] Ching-Nung Yang,et al. Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.