Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of the National Computer Conference, American Federation of Information Processing Societies, vol. 48, pp. 242–268 (1979)
2. He, J., Dawson, E.: How to fairly reconstruct a shared secret. In: Cryptography: Policy and Algorithms Conference, Australia, pp. 381–390 (1995)
3. Hwang, R.J., Chang, C.C.: Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. In: Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA 2004), vol. 1, pp. 208–212 (2004)
4. Laih, C.S., Lee, Y.C.: A v-Fairness (t, n) Secret Sharing Scheme. IEE Proceedings Computers and Digital Techniques 144(4), 245–248 (1997)
5. Lin, H.Y., Harn, L.: Fair Reconstruction of a secret. Information Processing Letters 55, 45–47 (1995)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献