Author:
Punekar Mayur,Malluhi Qutaibah,Desmedt Yvo,Wang Yongee
Publisher
Springer International Publishing
Reference24 articles.
1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. Blakely, G.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, pp. 313–317 (1979)
3. Lecture Notes in Computer Science;J Kurihara,2008
4. Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast $$(3, n)$$(3,n)-threshold secret sharing scheme using exclusive-or operations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91(1), 127–138 (2008)
5. Lv, C., Jia, X., Tian, L., Jing, J., Sun, M.: Efficient ideal threshold secret sharing schemes based on exclusive-or operations. In: Proceedings of 4th International Conference on Network and System Security (NSS), pp. 136–143 (2010)