Author:
Sardar Anususya,Y.V. Subba Rao,N. RukmaRekha
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
2. Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227–233 (1998)
3. Feldman, P.: A Practical Scheme for Non-interactive Verifiable Secret Sharing. In: Proc. IEEE Symp. Foundations of Computer Science, pp. 427–437 (1987)
4. Lecture Notes in Computer Science;T.P. Pedersen,1992
5. Han, Y., Yang, X., Sun, J., Li, D.: Verifiable Threshold Cryptosystems Based on Elliptic Curve. In: Proc. of ICCNMC 2003, pp. 334–337. IEEE Computer Society (2003)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献