A ( t , n ) Multi-secret Sharing Scheme with Updated Secret Shadows
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[3] Alimohammad Latif,et al. An adaptive secret image sharing with a new bitwise steganographic property , 2016, Inf. Sci..
[4] Lein Harn,et al. Verifiable secret sharing based on the Chinese remainder theorem , 2014, Secur. Commun. Networks.
[5] Neeta Nain,et al. An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[6] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[7] Shyamalendu Kandar,et al. A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values , 2015, ICISS.
[8] V. Ch. Venkaiah,et al. Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT , 2015 .
[9] Maroti Deshmukh,et al. Secure (n, n + 1)-Multi Secret Image Sharing Scheme Using Additive Modulo☆ , 2016 .
[10] Zhihui Li,et al. A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes , 2015, Secur. Commun. Networks.
[11] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Chakravarthy Bhagvati,et al. CRT Based Threshold Multi Secret Sharing Scheme , 2014, Int. J. Netw. Secur..
[14] Yixian Yang,et al. Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks , 2013, Int. J. Distributed Sens. Networks.
[15] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[16] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[17] Massoud Hadian Dehkordi,et al. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem , 2015, Inf. Sci..
[18] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[19] V. Ch. Venkaiah,et al. Multi-Stage Secret Sharing Schemes Based on Asmuth’s Bloom Sequence , 2016 .
[20] Y. Yeh,et al. Dynamic Multi-Secret Sharing Scheme , 2008 .
[21] Li Bai. A Reliable (k, n) Image Secret Sharing Scheme , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[22] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[23] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[24] Bibhas Chandra Dhara,et al. An Image Secret Sharing Technique with Block Based Image Coding , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[25] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[26] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).