({1,3},n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Hiroshi Doi,et al. A study on fast hierarchical secret sharing schemes , 2015 .
[3] Tamir Tassa,et al. Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.
[4] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[5] Tomohiko Uyematsu,et al. A Novel Realization of Threshold Schemes over Binary Field Extensions , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[6] Toshiaki Tanaka,et al. A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[7] Toshiaki Tanaka,et al. A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[8] Toshiaki Tanaka,et al. On a Fast (k, n)-Threshold Secret Sharing Scheme , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[9] Y. Fujii,et al. A fast (2,n)-threshold scheme and its application , 2005 .
[10] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).