Publisher
Springer Science and Business Media LLC
Subject
Physics and Astronomy (miscellaneous),General Mathematics
Reference44 articles.
1. Karlin, S., Karon, J.M.: On hermite-birkhoff interpolation. J. Approx. Theory 16(3), 538–543 (1966)
2. Ctlin, D.C., Laurentiu, T.F.: On the asymptotic idealness of the asmuth-bloom threshold secret sharing scheme. Inform. Sci. 463-464, 75–85 (2018)
3. Bahramian, M., Sheikhi-Garjan, M., Doche, C.: A threshold verifiable multi-secret sharing based on elliptic curves and chinese remainder theorem. IET Inf. Secur. 13(3), 278–284 (2019)
4. Cafaro, M., Pelle, P.: Space-efficient verifiable secret sharing using polynomial interpolation. IEEE T. Cloud Comput. PP(99), 1–1 (2015)
5. Cao, W.-F., Yang, Y.-G.: Verifiable quantum secret sharing protocols based on four-qubit entangled states. Int. J. Theor. Phys. 58(4), 1202–1214 (2019)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献