Threshold distributed access control with public verification: a practical application of PVSS
Author:
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Link
http://link.springer.com/content/pdf/10.1007/s10207-011-0151-4.pdf
Reference22 articles.
1. Benaloh, J.: Secret Sharing Homomorphisms: keeping Shares of a Secret. In CRYPTO ’86, pp. 251–260
2. Boneh D., Shacham H.: Fast variants of RSA. CryptoBytes 5(1), 1–9 (2002)
3. Boudot, F., Traore, J.: Efficient publicly verifiable secret sharing schemes with fast or delayed recovery. In ICICS ’99, pp. 87–102
4. Boudot, F.: Efficient proofs that a committed number lies in an interval. In EUROCRYPT ’00, LNCS 1807, pp. 431–444
5. Coppersmith D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptol. 10(4), 233–260 (1997)
Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Perfect ZK Argument of Knowledge of Discrete Logarithm in A Cyclic Group with Unknown Order;Proceedings of the 8th ACM on ASIA Public-Key Cryptography Workshop;2021-05-24
2. Brief Announcements: Verifiable Data Sharing in Distributed Computing;Lecture Notes in Computer Science;2020
3. A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem;Arabian Journal for Science and Engineering;2019-07-25
4. A fine-grained access control and revocation scheme on clouds;Concurrency and Computation: Practice and Experience;2012-11-22
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3