Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
暂无分享,去创建一个
Lei Zhu | Yichuan Wang | Ching-Nung Yang | Wenjiang Ji | Yanxiao Liu | Ching-Nung Yang | Lei Zhu | Yichuan Wang | Wenjiang Ji | Yanxiao Liu
[1] Satoshi Obana. Almost Optimum t-Cheater Identifiable Secret Sharing Schemes , 2011, EUROCRYPT.
[2] Yanxiao Liu. Linear (k, n) Secret Sharing Scheme with Cheating Detection , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[3] C. Pandu Rangan,et al. The Round Complexity of Verifiable Secret Sharing: The Statistical Case , 2010, ASIACRYPT.
[4] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[5] Hossein Ghodosi,et al. Comments on Harn–Lin’s cheating detection scheme , 2011, Des. Codes Cryptogr..
[6] Lein Harn,et al. (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial , 2017, Wirel. Pers. Commun..
[7] Kaoru Kurosawa,et al. Optimum Secret Sharing Scheme Secure against Cheating , 2006, SIAM J. Discret. Math..
[8] K. Srinathan,et al. Round-Optimal and Efficient Verifiable Secret Sharing , 2006, TCC.
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[11] Kaoru Kurosawa,et al. Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.
[12] Satoshi Obana,et al. t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes , 1995, CRYPTO.
[13] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[14] Wei Wei,et al. Cheating detection and cheater identification in (t, n) secret sharing scheme , 2014, Comput. Syst. Sci. Eng..
[15] Jonathan Katz,et al. Improving the round complexity of VSS in point-to-point networks , 2009, Inf. Comput..
[16] Dan Tang,et al. Secret image sharing scheme based on bivariate polynomial , 2012, 2012 2nd International Conference on Uncertainty Reasoning and Knowledge Engineering.
[17] Yan-Xiao Liu. Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)] , 2014, IET Inf. Secur..
[18] Lein Harn,et al. Detection and identification of cheaters in (t, n) secret sharing scheme , 2009, Des. Codes Cryptogr..
[19] Satoshi Takahashi,et al. Secret Sharing Scheme Suitable for Cloud Computing , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[20] Jonathan Katz,et al. Improving the round complexity of VSS in point-to-point networks , 2008, Inf. Comput..
[21] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[22] Kouichi Sakurai,et al. An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency , 2014, SPACE.
[23] Satoshi Obana,et al. Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution , 2006, ASIACRYPT.
[24] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.