A Probabilistic Algorithm for Secret Matrix Share Size Reduction
暂无分享,去创建一个
[1] Cheryl E. Praeger,et al. Cyclic Matrices Over Finite Fields , 1995 .
[2] Li Bai,et al. A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[3] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[4] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[7] Emmanouil A. Panaousis,et al. ROBUST: Reliable overlay based utilisation of services and topology for emergency MANETs , 2010, 2010 Future Network & Mobile Summit.
[8] Li Bai,et al. A Proactive Secret Sharing Scheme in matrix projection method , 2009, Int. J. Secur. Networks.
[9] Kai Wang,et al. A Multiple Secret Sharing Scheme based on Matrix Projection , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[10] Subhash C. Kak,et al. Space efficient secret sharing for implicit data security , 2011, Inf. Sci..
[11] Dawei Zhao,et al. A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure , 2012, Comput. Math. Appl..
[12] Christos Politis,et al. Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions , 2012, J. Networks.