The Research of Secret Sharing Scheme with Configurable Threshold
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[4] Sorin Iftene,et al. Weighted Threshold RSA Based on the Chinese Remainder Theorem , 2007, Ninth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2007).
[5] Massoud Hadian Dehkordi,et al. New efficient and practical verifiable multi-secret sharing schemes , 2008, Inf. Sci..
[6] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[7] Ioana Boureanu,et al. Weighted Threshold Secret Sharing Based on the Chinese Remainder Theorem , 2005, Sci. Ann. Cuza Univ..
[8] Chin-Chen Chang,et al. A scheme for threshold multi-secret sharing , 2005, Appl. Math. Comput..
[9] Rong Zhao,et al. A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.