A Publicly Verifiable and Cheating Resistant Secret Sharing Based on Public Key Cryptosystem and Hash Function

[1]  Berry Schoenmakers,et al.  A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.

[2]  Jiguo Yu,et al.  A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.

[3]  A novel approach for verifiable (n, n) audio secret sharing scheme , 2018, Multimedia Tools and Applications.

[4]  Fei-Yue Wang,et al.  GAN-Based Key Secret-Sharing Scheme in Blockchain , 2020, IEEE Transactions on Cybernetics.

[5]  Qiang Lu,et al.  RETRACTED ARTICLE: Image retargeting based on self-learning 3D saliency for content-aware data analysis , 2017, Multimedia Tools and Applications.

[6]  Jyoti Prakash Singh,et al.  A verifiable multi-secret image sharing scheme using XOR operation and hash function , 2020, Multimedia Tools and Applications.

[7]  Jianfeng Ma,et al.  Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings , 2012, Int. J. Netw. Secur..

[8]  Samaneh Mashhadi,et al.  Secure publicly verifiable and proactive secret sharing schemes with general access structure , 2017, Inf. Sci..

[9]  Wang Rui,et al.  A k-RSA algorithm , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[10]  Tzong-Chen Wu,et al.  Cheating detection and cheater identification in secret sharing schemes , 1995 .

[11]  Lei Zhu,et al.  Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..

[12]  Amit Kumar Singh,et al.  An efficient Boolean based multi-secret image sharing scheme , 2019, Multimedia Tools and Applications.

[13]  Rong Zhao,et al.  A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.

[14]  Yanhong Liu,et al.  Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..

[15]  Lein Harn,et al.  Detection and identification of cheaters in (t, n) secret sharing scheme , 2009, Des. Codes Cryptogr..

[16]  Vassilios G. Vassilakis,et al.  A Secure Scheme for Group Communication of Wireless IoT Devices , 2018, 2018 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP).

[17]  Sukumar Nandi,et al.  Publicly verifiable secret sharing scheme in hierarchical settings using CLSC over IBC , 2017 .

[18]  Lein Harn,et al.  Strong (n, t, n) verifiable secret sharing scheme , 2010, Inf. Sci..

[19]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[20]  Ching-Nung Yang,et al.  (k,n) secret image sharing scheme capable of cheating detection , 2018, EURASIP J. Wirel. Commun. Netw..

[21]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[22]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[23]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[24]  Satoshi Obana,et al.  Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters , 2016, ICITS.

[25]  Chunqiang Hu,et al.  Secure Auctions without an Auctioneer via Verifiable Secret Sharing , 2015, PAMCO@MobiHoc.

[26]  Sonali Patil,et al.  Verifiable image Secret Sharing in Matrix Projection using watermarking , 2014, 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA).

[27]  Mahabir Prasad Jhanwar,et al.  A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme , 2011, ISPEC.

[28]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.