A completely fair secret sharing scheme without dealer
暂无分享,去创建一个
Zhaowen Lin | Fei Xiao | Yi Sun | Xiaoming Yang | Gaochao Li | Zhaowen Lin | Fei Xiao | Yi Sun | G. Li | Xiaoming Yang
[1] Qi Cheng,et al. An ideal multi-secret sharing scheme based on MSP , 2011, Inf. Sci..
[2] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[3] Lein Harn,et al. Strong (n, t, n) verifiable secret sharing scheme , 2010, Inf. Sci..
[4] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Zhihui Li,et al. Remarks on- an ideal multi-secret sharing scheme based on MSP , 2012, IACR Cryptol. ePrint Arch..
[6] Silvio Micali,et al. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[7] Manuel Blum,et al. How to exchange (secret) keys , 1983, TOCS.
[8] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Manuel Blum. How to Exchange (Secret) Keys (Extended Abstract) , 1983, STOC 1983.
[11] Ziba Eslami,et al. A verifiable multi-secret sharing scheme based on cellular automata , 2010, Inf. Sci..
[12] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.