A Proactive Secret Sharing Scheme in matrix projection method
暂无分享,去创建一个
[1] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[2] Byrav Ramamurthy,et al. Secure Group Communications Over Data Networks , 2004 .
[3] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[4] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Douglas R. Stinson,et al. Decomposition constructions for secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[6] Fred B. Schneider,et al. CODEX: a robust and secure secret distribution system , 2004, IEEE Transactions on Dependable and Secure Computing.
[7] Amos Beimel,et al. Secret Sharing with Public Reconstruction , 1998, IEEE Trans. Inf. Theory.
[8] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[9] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[10] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[11] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[12] Kaoru Kurosawa,et al. MDS secret-sharing scheme secure against cheaters , 2000, IEEE Trans. Inf. Theory.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Li Bai,et al. A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).