CRT based secured encryption scheme
暂无分享,去创建一个
[1] Wang Zhifang,et al. A non-interactive modular verifiable secret sharing scheme , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..
[2] A. Salomaa,et al. Chinese remainder theorem: applications in computing, coding, cryptography , 1996 .
[3] Ali Aydin Selçuk,et al. A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem , 2008, INDOCRYPT.
[4] Ali Aydin Selçuk,et al. Robust Threshold Schemes Based on the Chinese Remainder Theorem , 2008, AFRICACRYPT.
[5] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[6] Sorin Iftene,et al. Secret Sharing Schemes with Applications in Security Protocols , 2006, Sci. Ann. Cuza Univ..
[7] Bart Preneel,et al. On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem , 2002, Public Key Cryptography.
[8] Ron Steinfeld,et al. Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2007, IEEE Trans. Inf. Theory.