Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
暂无分享,去创建一个
Massoud Hadian Dehkordi | Samaneh Mashhadi | Niloofar Kiamari | M. H. Dehkordi | S. Mashhadi | Niloofar Kiamari
[1] Qi Cheng,et al. An ideal multi-secret sharing scheme based on MSP , 2011, Inf. Sci..
[2] Mohammad Reza Aref,et al. Efficient multistage secret sharing scheme using bilinear map , 2014, IET Inf. Secur..
[3] Liangliang Xiao,et al. Linear multi-secret sharing schemes based on multi-party computation , 2006, Finite Fields Their Appl..
[4] Samaneh Mashhadi. How to Fairly Share Multiple Secrets Stage by Stage , 2016, Wirel. Pers. Commun..
[5] Lein Harn,et al. Unconditionally Secure Verifiable Secret Sharing Scheme , 2012 .
[6] Ziba Eslami,et al. A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps , 2012, Wirel. Pers. Commun..
[7] Yuh-Min Tseng,et al. Publicly verifiable multi-secret sharing scheme from bilinear pairings , 2013, IET Inf. Secur..
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Yanxiao Liu. Linear (k, n) Secret Sharing Scheme with Cheating Detection , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[10] Lein Harn,et al. An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs , 2014, Wirel. Pers. Commun..
[11] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[12] Germán Sáez,et al. Sharing many secrets with computational provable security , 2013, Inf. Process. Lett..
[13] Wei-Pang Yang,et al. A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.
[14] Qi Cheng,et al. A novel linear multi-secret sharing scheme for group communication in wireless mesh networks , 2011, J. Netw. Comput. Appl..
[15] Samaneh Mashhadi,et al. Secure publicly verifiable and proactive secret sharing schemes with general access structure , 2017, Inf. Sci..
[16] Yan-Xiao Liu. Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)] , 2014, IET Inf. Secur..
[17] Yu-Min Wang,et al. A New (t, n) Multi-Secret Sharing Scheme , 2005, 2008 International Conference on Computer and Electrical Engineering.
[18] Mohammad Sayad Haghighi,et al. Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps , 2015, IET Inf. Secur..
[19] Avishek Adhikari,et al. An efficient multi-use multi-secret sharing scheme based on hash function , 2010, Appl. Math. Lett..
[20] Massoud Hadian Dehkordi,et al. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem , 2015, Inf. Sci..
[21] Jie Zhang,et al. Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications , 2015, Future Gener. Comput. Syst..
[22] Zhenfu Cao,et al. A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..