Sequential Secret Sharing Scheme Based on Level Ordered Access Structure
暂无分享,去创建一个
V. Ch. Venkaiah | Appala Naidu Tentu | Allam Appa Rao | A. A. Rao | Dileep Kumar Pattipati | V. Venkaiah | V. C. Venkaiah | A. Tentu
[1] Mihir Bellare,et al. Robust computational secret sharing and a unified account of classical secret-sharing goals , 2007, CCS '07.
[2] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Xian-Mo Zhang,et al. Ideal Secret Sharing Schemes from Permutations , 2006, Int. J. Netw. Secur..
[5] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[6] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[7] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[8] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[9] Indranil Sengupta,et al. Cryptosystem for Secret Sharing Scheme with Hierarchical Groups , 2013, Int. J. Netw. Secur..
[10] Ken Martin. Discrete Structures in the Theory of Secret Sharing , 1991 .
[11] Tamir Tassa,et al. Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.
[12] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[13] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[14] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[15] Gustavus J. Simmons,et al. Prepositioned Shared Secret and/or Shared Control Schemes , 1990, EUROCRYPT.
[16] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[17] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[18] L. Harn,et al. Comment on "Multistage secret sharing based on one-way function" , 1995 .