Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation
暂无分享,去创建一个
[1] Khin Mi Mi Aung,et al. Privacy-Preserved Multi-Party Data Merging with Secure Equality Evaluation , 2016, 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI).
[2] G. Sadashivappa,et al. Secure multi-party computation protocol using asymmetric encryption , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).
[3] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[4] Mourad Debbabi,et al. Protocols for secure multi-party private function evaluation , 2015, 2015 First International Conference on Anti-Cybercrime (ICACC).
[5] Ziba Eslami,et al. Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata , 2017, IACR Cryptol. ePrint Arch..
[6] Sonja Filiposka,et al. Parallel implementation of the modified subset sum problem in CUDA , 2014, 2014 22nd Telecommunications Forum Telfor (TELFOR).
[7] Jieqing Ai,et al. A tightly secure multi-party-signature protocol in the plain model , 2015, 2015 8th International Conference on Biomedical Engineering and Informatics (BMEI).
[8] Mbarek Marwan,et al. Applying secure multi-party computation to improve collaboration in healthcare cloud , 2016, 2016 Third International Conference on Systems of Collaboration (SysCo).
[9] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[10] George Thomas,et al. A novel mathematical model for group communication with trusted key generation and distribution using shamir's secret key and USB security , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[11] Aniket Kate,et al. Computational Verifiable Secret Sharing Revisited , 2011, ASIACRYPT.
[12] Lein Harn,et al. Fair secret reconstruction in (t, n) secret sharing , 2015, J. Inf. Secur. Appl..
[13] Masahiro Fujita,et al. Efficient sum-to-one subsets algorithm for logic optimization , 1992, [1992] Proceedings 29th ACM/IEEE Design Automation Conference.
[14] Ueli Maurer,et al. Anonymous Authentication with Shared Secrets , 2014, LATINCRYPT.
[15] Peijian Ju,et al. Subset-sum based relay selection for multipath TCP in cooperative LTE networks , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[16] Kevin C. Almeroth,et al. Trust 2.0: Who to believe in the flood of online data? , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[17] K. Nimmy. Novel multi-server authentication protocol using secret sharing , 2016, 2016 International Conference on Data Mining and Advanced Computing (SAPIENCE).