Efficient multisecret sharing scheme using new proposed computational security model
暂无分享,去创建一个
[1] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[4] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[5] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[6] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[7] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[8] L. Harn,et al. Comment on "Multistage secret sharing based on one-way function" , 1995 .
[9] L. Harn. Efficient sharing (broadcasting) of multiple secrets , 1995 .
[10] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[11] Moni Naor,et al. Visual Cryptography II: Improving the Contrast Via the Cover Base , 1996, Security Protocols Workshop.
[12] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[13] Rosario Gennaro,et al. Securing Threshold Cryptosystems against Chosen Ciphertext Attack , 1998, Journal of Cryptology.
[14] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[15] Wei-Pang Yang,et al. A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.
[16] Barbara Masucci. Sharing Multiple Secrets: Models, Schemes and Analysis , 2006, Des. Codes Cryptogr..
[17] Y. Yeh,et al. Dynamic Multi-Secret Sharing Scheme , 2008 .
[18] Avishek Adhikari,et al. An efficient multi-use multi-secret sharing scheme based on hash function , 2010, Appl. Math. Lett..
[19] Mohammad Reza Aref,et al. Efficient multistage secret sharing scheme using bilinear map , 2014, IET Inf. Secur..
[20] Partha Sarathi Roy,et al. Multi-Use Multi-Secret Sharing Scheme for General Access Structure , 2014, ArXiv.
[21] Lein Harn,et al. Secure secret reconstruction and multi-secret sharing schemes with unconditional security , 2014, Secur. Commun. Networks.
[22] V. P. Binu,et al. An effective private data storage and retrieval system using secret sharing scheme based on secure multi-party computation , 2014, 2014 International Conference on Data Science & Engineering (ICDSE).
[23] Germán Sáez,et al. New results and applications for multi-secret sharing schemes , 2014, Des. Codes Cryptogr..
[24] Tian Zeng,et al. Multilevel threshold multi-secret sharing scheme based on LUC public key encryption , 2014 .
[25] Shu-guang Dai,et al. The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures , 2014 .
[26] Massoud Hadian Dehkordi,et al. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem , 2015, Inf. Sci..
[27] Jérôme Darmont,et al. A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud , 2015, Int. J. Data Warehous. Min..
[28] Shyamalendu Kandar,et al. A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values , 2015, ICISS.
[29] Lixiang Li,et al. A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture , 2015, Int. J. Distributed Sens. Networks.
[30] Lixiang Li,et al. A biometrics and smart cards-based authentication scheme for multi-server environments , 2015, Secur. Commun. Networks.
[31] P. Dharani,et al. Survey on secret sharing scheme with deduplication in cloud computing , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).
[32] Ying Xia,et al. Lightweight Data Storage Based on Secret Sharing for Cloud Data , 2015, 2015 Ninth International Conference on Frontier of Computer Science and Technology.
[33] Zhihui Li,et al. A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes , 2015, Secur. Commun. Networks.
[34] Yanhong Liu,et al. Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..