Author:
Ding Jian,Ke Pinhui,Lin Changlu,Wang Huaxiong
Publisher
Springer Science and Business Media LLC
Subject
Information Systems,Computer Science (miscellaneous)
Reference26 articles.
1. Blakley G R, Safeguarding cryptographic keys, Proceedings of the National Computer Conference’ 1979, AFIPS Proceedings, 1979, 48: 313–317.
2. Shamir A, How to share a secret, Communications of the ACM, 1979, 22(11): 612–613.
3. Asmuth C and Bloom J, A modular approach to key safeguarding, IEEE Trans. Inf. Theory, 1983, 29(2): 208–210.
4. Harn L and Miao F, Weighted secret sharing based on the Chinese Remainder Theorem, Int. Netw. Secur., 2014, 16(6): 420–425.
5. Harn L and Miao F, Multilevel threshold secret sharing based on the Chinese Remainder Theorem, Inf. Process. Lett., 2014, 114(9): 504–509.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Preface to the Special Topic on Computer Mathematics;Journal of Systems Science and Complexity;2023-02