New schemes for sharing points on an elliptic curve
暂无分享,去创建一个
Ping Luo | Duo Liu | Yiqi Dai | Dongping Huang | Duo Liu | Ping Luo | Yiqi Dai | Dongping Huang
[1] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[2] Leonard M. Adleman,et al. A subexponential algorithm for the discrete logarithm problem with applications to cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[5] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[6] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[7] L. Harn. Efficient sharing (broadcasting) of multiple secrets , 1995 .
[8] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[9] Hyang-Sook Lee. A self-pairing map and its applications to cryptography , 2004, Appl. Math. Comput..
[10] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[11] L. Harn,et al. Comment on "Multistage secret sharing based on one-way function" , 1995 .
[12] Gustavus J. Simmons,et al. An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[15] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[16] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..