Author:
Jia Xingxing,Guo Yusheng,Luo Xiangyang,Wang Daoshun,Zhang Chaoyang
Funder
National Natural Science Foundation of China
Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference39 articles.
1. Attribute-based encryption for fine-grained access control of encrypted data;Goyal,2006
2. Y. Ning, F. Miao, W. Huang, K. Meng, Y. Xiong, X. Wang, Constructing ideal secret sharing schemes based on Chinese Remainder Theorem, in: Advances in Cryptology-ASIACRYPTO 2018, Lecture Notes in Computer Science, Springer, 2018, pp. 310–331.
3. How to share a secret;Shamir;Commun. ACM,1979
4. G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the 1979 AFIPS National Computer Conference, AFIPS Conference Proceedings, AFIPS Press, 1979, pp. 313–318.
5. Randomized component and its application to (t,m,n)-group oriented secret sharing;Miao;IEEE Trans. Inf. Forensics Secur.,2015
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献