Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference22 articles.
1. Secret sharing homomorphisms: keeping shares of a secret;Benaloh,1987
2. Safeguarding cryptographic keys;Blakley,1979
3. Asynchronous verifiable secret sharing and proactive cryptosystems;Cachin,2002
4. Random oracles in constantinople: practical asynchronous Byzantine agreement using cryptography;Cachin;Journal of Cryptology,2005
5. An improvement on the Lin–Wu (t,n) threshold verifiable multi-secret sharing scheme;Chang;Applied Mathematics and Computation,2005
Cited by
64 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fast 2-out-of-n ECDSA Threshold Signature;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
2. A Verifiable Multi-Secret Sharing Scheme Based on ℓ-Intersection Pair of Cyclic Codes;International Journal of Foundations of Computer Science;2023-11-29
3. Multi-secret Sharing Scheme for Zero Trust Environment;2023 IEEE 14th International Conference on Software Engineering and Service Science (ICSESS);2023-10-17
4. A Verifiable Secret Sharing Scheme using Elliptic Curve Cryptography;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
5. A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain;IEEE Internet of Things Journal;2023