Security Analysis of a Hash-Based Secret Sharing Scheme
暂无分享,去创建一个
[1] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[2] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[3] Felix Brandt,et al. On the Existence of Unconditionally Privacy-Preserving Auction Protocols , 2008, TSEC.
[4] Aggelos Kiayias,et al. Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections , 2010, Financial Cryptography.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Yanhong Liu,et al. Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..
[7] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[8] R. Cramer,et al. Multiparty Computation, an Introduction , 2005 .
[9] Stephen R. Tate,et al. A Direct Anonymous Attestation Scheme for Embedded Devices , 2007, Public Key Cryptography.
[10] Chi Sing Chum,et al. Implementations of a Hash Function Based Secret Sharing Scheme , 2015 .
[11] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[12] Jeong Hyun Yi,et al. Threshold cryptography in P2P and MANETs: The case of access control , 2007, Comput. Networks.
[13] Xiaowen Zhang,et al. Hash function-based secret sharing scheme designs , 2011, Secur. Commun. Networks.