Author:
Tartary Christophe,Pieprzyk Josef,Wang Huaxiong
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS 1979 National Computer Conference, pp. 313–317. AFIPS Press (1979)
2. Chan, C.-W., Chang, C.-C.: A scheme for threshold multi-secret sharing. Applied Mathematics and Computation 166(1), 1–14 (2005)
3. Chang, T.-Y., Hwang, M.-S., Yang, W.-P.: An improvement on the Lin-Wu (t,n) threshold verifiable multi-secret sharing scheme. Applied Mathematics and Computation 163(1), 169 (2005)
4. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: A practical (t,n) multi-secret sharing. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E83-A(12), 2762–2765 (2000)
5. Lecture Notes in Computer Science;S. Contini,2006
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Quantum multi-secret sharing via trap codes and discrete quantum walks;Quantum Information Processing;2022-11-14
2. Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2017
3. Key Management;IT Policy and Ethics;2013
4. Key Management;Network Security, Administration and Management