Multisecret Threshold Schemes

Author:

Jackson Wen-Ai,Martin Keith M.,O’Keefe Christine M.

Publisher

Springer Berlin Heidelberg

Reference17 articles.

1. J. Benaloh and J. Leichter: Generalized Secret Sharing and Monotone Functions. Advances in Cryptology — Crypto’ 88, Lecture Notes in Comput. Sci. 403 (1990) 27–35

2. G. R. Blakley: Safeguarding cryptographic keys. Proceedings of AFIPS 1979 National Computer Conference 48 (1979) 313–317

3. G. R. Blakley and C. Meadows: Security of Ramp Schemes. Advances in Cryptology — Crypto’ 84, Lecture Notes in Comput. Sci. 196 (1985) 411–431

4. R. Blom: An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology-Eurocrypt’84, Lecture Notes in Comput. Sci. 209 (1984) 335–338

5. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. Presented at Crypto’92

Cited by 22 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Randomness Requirements for Three-Secret Sharing;2023 IEEE International Symposium on Information Theory (ISIT);2023-06-25

2. Quantum multi-secret sharing via trap codes and discrete quantum walks;Quantum Information Processing;2022-11-14

3. Resource-Efficient OT Combiners with Active Security;Theory of Cryptography;2017

4. Localised multisecret sharing;Cryptography and Communications;2016-08-31

5. The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures;Acta Mathematicae Applicatae Sinica, English Series;2014-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3