Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme
暂无分享,去创建一个
[1] Satoshi Obana. Almost Optimum t-Cheater Identifiable Secret Sharing Schemes , 2011, EUROCRYPT.
[2] Qassim Al Mahmoud. A Novel Verifiable Secret Sharing with Detection and Identification of Cheaters' Group , 2016 .
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Wakaha Ogata,et al. Cheating Detectable Secret Sharing Schemes for Random Bit Strings , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Yan-Xiao Liu,et al. Linear (k, n) Secret Sharing Scheme with Cheating Detection , 2015, CIT/IUCC/DASC/PICom.
[6] C. Padró,et al. Secret Sharing Schemes with Detection of Cheaters for a General Access Structure , 2002 .
[7] Lei Zhu,et al. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..
[8] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[9] Kouichi Sakurai,et al. An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency , 2014, IACR Cryptol. ePrint Arch..
[10] Satoshi Takahashi,et al. Secret Sharing Scheme Suitable for Cloud Computing , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[11] Aniket Kate,et al. Computational Verifiable Secret Sharing Revisited , 2011, ASIACRYPT.
[12] Lei Zhu,et al. Efficient (k, n) Secret Sharing Scheme Secure against k — 2 Cheaters , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[13] Satoshi Obana,et al. Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings , 2015, IWSEC.
[14] Wakaha Ogata,et al. Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets , 2017, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..