CRT Based Threshold Multi Secret Sharing Scheme
暂无分享,去创建一个
[1] Shiuh-Jeng Wang,et al. Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[2] Runhua Shi,et al. A (t, n)-Threshold Verified Multi-secret Sharing Scheme Based on ECDLP , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[3] Ali Aydin Selçuk,et al. Robust Threshold Schemes Based on the Chinese Remainder Theorem , 2008, AFRICACRYPT.
[4] Liusheng Huang,et al. A (t, n)-Threshold Verified Multi-secret Sharing Scheme Based on ECDLP , 2007 .
[5] Ali Aydin Selçuk,et al. A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem , 2008, INDOCRYPT.
[6] Jianfeng Ma,et al. Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings , 2012, Int. J. Netw. Secur..
[7] A. Salomaa,et al. Chinese remainder theorem: applications in computing, coding, cryptography , 1996 .
[8] Chakravarthy Bhagvati,et al. Multi-Secret Communication Scheme , 2012 .
[9] Wei-Pang Yang,et al. An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme , 2005, Appl. Math. Comput..
[10] Runhua Shi,et al. An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme , 2008, WKDD.
[11] Wu Yan,et al. Threshold Multi-Secret Sharing Scheme for Cheat-Proof among Weighted Participants , 2009, 2009 Second International Symposium on Electronic Commerce and Security.
[12] Douglas R Stinson. Cryptography : Theory and Practice -3/E. , 2014 .
[13] Wei-Pang Yang,et al. An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem , 2011, Inf. Technol. Control..
[14] Sorin Iftene,et al. Secret Sharing Schemes with Applications in Security Protocols , 2006, Sci. Ann. Cuza Univ..
[15] Chakravarthy Bhagvati,et al. CRT based secured encryption scheme , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[16] Bart Preneel,et al. On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem , 2002, Public Key Cryptography.
[17] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[18] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[19] C. Ding. Chinese remainder theorem , 1996 .
[20] Wei-Pang Yang,et al. A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.
[21] Wang Zhifang,et al. A non-interactive modular verifiable secret sharing scheme , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..
[22] Xian-Mo Zhang,et al. Ideal Secret Sharing Schemes from Permutations , 2006, Int. J. Netw. Secur..