Funder
National Natural Science Foundation of China
Natural Science Fund for Colleges and Universities in Jiangsu Province
NSF of Jiangsu Province of China
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference19 articles.
1. How to share a secret;Shamir;Comm. ACM.,1979
2. B. Chor, S. Goldwasser, S. Micall, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: The 26th IEEE Symposium on the Foundations of Computer Science, FOCS, 1985, pp. 383–395.
3. P. Feldman, A practical scheme for non-interactive verifiable secret sharing, in: The 28th IEEE Symposium on the Foundations of Computer Science, FOCS, 1987, pp. 427–437.
4. Non-interactive and information-theoretic secure verifiable secret sharing;Pedersen,1991
5. A secure and efficient general VSS protocol;Zhang;J. Softw.,2002
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Multi-secret Sharing Scheme for Zero Trust Environment;2023 IEEE 14th International Conference on Software Engineering and Service Science (ICSESS);2023-10-17
2. A Verifiable Secret Sharing Scheme using Elliptic Curve Cryptography;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
3. Cryptanalysis and improvement of Q. Peng et al.’s PVSS scheme;Cryptologia;2023-04-18
4. Game-based security proofs for verifiable secret sharing schemes in the standard model;Information Security Journal: A Global Perspective;2022-12-29
5. A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification;Journal of Ambient Intelligence and Humanized Computing;2022-07-29