A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution
暂无分享,去创建一个
[1] Ron Steinfeld,et al. Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2004, IEEE Transactions on Information Theory.
[2] Dan Boneh,et al. Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.
[3] Duncan S. Wong,et al. Practical Distributed Signatures in the Standard Model , 2014, CT-RSA.
[4] Yanhong Liu,et al. Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..
[5] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[6] Vadim Lyubashevsky,et al. Lattice-Based Identification Schemes Secure Under Active Attacks , 2008, Public Key Cryptography.
[7] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[8] Hung-Min Sun,et al. Digital multisignature schemes for authenticating delegates in mobile code systems , 2000, IEEE Trans. Veh. Technol..
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[11] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[12] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[13] Shafi Goldwasser,et al. Complexity of lattice problems , 2002 .
[14] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[15] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[16] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[17] Chuntian Cheng,et al. An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme , 2005, WAIM.
[18] Mohammed Meziani,et al. An Efficient Lattice-Based Secret Sharing Construction , 2012, WISTP.
[19] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[20] Ziba Eslami,et al. A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps , 2012, Wirel. Pers. Commun..
[21] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[22] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[23] Massoud Hadian Dehkordi,et al. New efficient and practical verifiable multi-secret sharing schemes , 2008, Inf. Sci..
[24] Keisuke Tanaka,et al. Multi-bit Cryptosystems Based on Lattice Problems , 2007, Public Key Cryptography.
[25] Shafi Goldwasser,et al. Complexity of lattice problems - a cryptographic perspective , 2002, The Kluwer international series in engineering and computer science.
[26] Tanja Lange,et al. Post-quantum cryptography , 2008, Nature.
[27] Wei-Pang Yang,et al. A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.
[28] L. Harn. Efficient sharing (broadcasting) of multiple secrets , 1995 .
[29] L. Harn,et al. Comment on "Multistage secret sharing based on one-way function" , 1995 .