An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme
暂无分享,去创建一个
[1] Lein Harn,et al. Strong (n, t, n) verifiable secret sharing scheme , 2010, Inf. Sci..
[2] Chin-Chen Chang,et al. Enhancing the efficiency of (v, r, n)-fairness secret sharing scheme , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[3] C.-S. Laih,et al. V-fairness (t, n) secret sharing scheme , 1997 .
[4] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] R.-J. Hwang,et al. Efficient cheater identification method for threshold schemes , 1997 .
[7] Tan Kai. CHEATER IDENTIFICATION IN ( t,n ) THRESHOLD SCHEME , 1999 .
[8] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[9] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[10] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[11] Lein Harn,et al. Fair Reconstruction of a Secret , 1995, Inf. Process. Lett..
[12] Yuh-Min Tseng. Multi-party key agreement protocols with cheater identification , 2003, Appl. Math. Comput..
[13] MARCO CARPENTIERI. A perfect threshold secret sharing scheme to identify cheaters , 1995, Des. Codes Cryptogr..
[14] Tzonelih Hwang,et al. (t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEM , 2000, Cryptologia.
[15] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[16] Kwok-Yan Lam,et al. On identification secret sharing schemes , 2003, Inf. Comput..
[17] Tzong-Chen Wu,et al. Cheating detection and cheater identification in secret sharing schemes , 1995 .