A Publicly Verifiable and Cheating Resistant Secret Sharing Based on Public Key Cryptosystem and Hash Function
暂无分享,去创建一个
[1] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[2] Jiguo Yu,et al. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.
[3] A novel approach for verifiable (n, n) audio secret sharing scheme , 2018, Multimedia Tools and Applications.
[4] Fei-Yue Wang,et al. GAN-Based Key Secret-Sharing Scheme in Blockchain , 2020, IEEE Transactions on Cybernetics.
[5] Qiang Lu,et al. RETRACTED ARTICLE: Image retargeting based on self-learning 3D saliency for content-aware data analysis , 2017, Multimedia Tools and Applications.
[6] Jyoti Prakash Singh,et al. A verifiable multi-secret image sharing scheme using XOR operation and hash function , 2020, Multimedia Tools and Applications.
[7] Jianfeng Ma,et al. Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings , 2012, Int. J. Netw. Secur..
[8] Samaneh Mashhadi,et al. Secure publicly verifiable and proactive secret sharing schemes with general access structure , 2017, Inf. Sci..
[9] Wang Rui,et al. A k-RSA algorithm , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[10] Tzong-Chen Wu,et al. Cheating detection and cheater identification in secret sharing schemes , 1995 .
[11] Lei Zhu,et al. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..
[12] Amit Kumar Singh,et al. An efficient Boolean based multi-secret image sharing scheme , 2019, Multimedia Tools and Applications.
[13] Rong Zhao,et al. A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.
[14] Yanhong Liu,et al. Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..
[15] Lein Harn,et al. Detection and identification of cheaters in (t, n) secret sharing scheme , 2009, Des. Codes Cryptogr..
[16] Vassilios G. Vassilakis,et al. A Secure Scheme for Group Communication of Wireless IoT Devices , 2018, 2018 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP).
[17] Sukumar Nandi,et al. Publicly verifiable secret sharing scheme in hierarchical settings using CLSC over IBC , 2017 .
[18] Lein Harn,et al. Strong (n, t, n) verifiable secret sharing scheme , 2010, Inf. Sci..
[19] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[20] Ching-Nung Yang,et al. (k,n) secret image sharing scheme capable of cheating detection , 2018, EURASIP J. Wirel. Commun. Netw..
[21] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[22] Adi Shamir,et al. How to share a secret , 1979, CACM.
[23] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[24] Satoshi Obana,et al. Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters , 2016, ICITS.
[25] Chunqiang Hu,et al. Secure Auctions without an Auctioneer via Verifiable Secret Sharing , 2015, PAMCO@MobiHoc.
[26] Sonali Patil,et al. Verifiable image Secret Sharing in Matrix Projection using watermarking , 2014, 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA).
[27] Mahabir Prasad Jhanwar,et al. A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme , 2011, ISPEC.
[28] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.