Verifiable Multi-Secret Sharing Schemes from Homogeneous Linear Recursion
暂无分享,去创建一个
Chunming Tang | Jun He | Lijuan Li | Ximei Li | L. Li | Junjie He | Chunming Tang | Ximei Li
[1] Rong Zhao,et al. A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.
[2] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[3] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[4] Massoud Hadian Dehkordi,et al. An efficient threshold verifiable multi-secret sharing , 2008, Comput. Stand. Interfaces.
[5] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[6] Chin-Chen Chang,et al. An on-line secret sharing scheme for multi-secrets , 1998, Comput. Commun..
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[9] Zhenfu Cao,et al. A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..