Subject
Applied Mathematics,Computer Science Applications
Reference18 articles.
1. Blakley, G. R. 1979. Safeguarding cryptographic keys. In Proceedings of the AFIPS ’79, National Computer Conference, 25-28 February 1979, California, vol. 48, 313–317.
2. Chor, B., S. Goldwasser, S. Micali, and B. Awerbuch. 1985. Verifiable secret sharing and achieving simultaneity in presence of faults. Proceedings of 26th IEEE Symposium on FOCS, SFCS ’85, United States, Portland, OR, USA, 21/10/85 → 23/10/85, 383–95.
3. A practical scheme for non-interactive verifiable secret sharing
4. A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
5. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem