Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
暂无分享,去创建一个
Mingchu Li | Kim-Kwang Raymond Choo | Cheng Guo | Yizhi Ren | Lifeng Yuan | Mingchu Li | Yizhi Ren | Cheng Guo | Lifeng Yuan
[1] Kim-Kwang Raymond Choo. A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework , 2014 .
[2] Pinyi Ren,et al. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.
[3] Michail Matthaiou,et al. Hybrid millimeter-wave systems: a novel paradigm for hetnets , 2015, IEEE Communications Magazine.
[4] Rajiv Ranjan,et al. An integrated static detection and analysis framework for android , 2016, Pervasive Mob. Comput..
[5] Kun Peng. Critical survey of existing publicly verifiable secret sharing schemes , 2012, IET Inf. Secur..
[6] Ron Steinfeld,et al. Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2007, IEEE Trans. Inf. Theory.
[7] Kim-Kwang Raymond Choo,et al. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Ron Steinfeld,et al. Lattice-based threshold-changeability for standard CRT secret-sharing schemes , 2006, Finite Fields Their Appl..
[10] Dieter Gollmann,et al. Key Escrow in Mutually Mistrusting Domains , 1996, Security Protocols Workshop.
[11] Houbing Song,et al. A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Communication Systems , 2011, 2011 IEEE International Conference on Communications (ICC).
[12] Yeow Meng Chee,et al. Threshold changeable secret sharing schemes revisited , 2012, Theor. Comput. Sci..
[13] Xiaohui Tao,et al. ICTs and the Millennium Development Goals: A United Nations Perspective , 2014 .
[14] Josef Pieprzyk,et al. Changing Thresholds in the Absence of Secure Channels , 1999, Aust. Comput. J..
[15] Houbing Song,et al. Cyber-physical systems for water sustainability: challenges and opportunities , 2015, IEEE Communications Magazine.
[16] Douglas R. Stinson,et al. On dealer-free dynamic threshold schemes , 2013, Adv. Math. Commun..
[17] Lein Harn,et al. Dynamic threshold secret reconstruction and its application to the threshold cryptography , 2015, Inf. Process. Lett..
[18] Reihaneh Safavi-Naini,et al. Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures , 1999, Comput. J..
[19] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[20] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..
[21] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[22] Enzo Baccarelli,et al. Energy-efficient adaptive networked datacenters for the QoS support of real-time applications , 2014, The Journal of Supercomputing.
[23] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[24] Saba Asaad,et al. A lattice-based threshold secret sharing scheme , 2014, 2014 11th International ISC Conference on Information Security and Cryptology.
[25] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[26] Jinjun Chen,et al. A security framework in G-Hadoop for big data computing across distributed Cloud data centres , 2014, J. Comput. Syst. Sci..
[27] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[28] Sushil Jajodia,et al. Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .
[29] Keith M. Martin,et al. Updating the parameters of a threshold scheme by minimal broadcast , 2005, IEEE Transactions on Information Theory.
[30] Huaxiong Wang,et al. Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme , 2006, Inscrypt.
[31] P. S. Avadhani,et al. A Model on Dynamic Threshold Multi-Secret Sharing Scheme using Pell's Equation with Jacobi Symbol , 2013, 2013 10th International Conference on Information Technology: New Generations.
[32] Mohammad Shojafar,et al. FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..
[33] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[34] Al-Sakib Khan Pathan,et al. Securing Cyber-Physical Systems , 2015 .
[35] Chi-Sung Laih,et al. Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space , 1989, CRYPTO.
[36] Burak Kantarci,et al. Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.
[37] Mark Lomas. Security Protocols International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings , 1997 .
[38] Feng Wang,et al. Dynamic threshold changeable multi-policy secret sharing scheme , 2015, Secur. Commun. Networks.
[39] Gilles Brassard,et al. Advances in Cryptology — CRYPTO’ 89 Proceedings , 2001, Lecture Notes in Computer Science.