Author:
Liu Yanxiao,Yang Chingnung,Wang Yichuan,Zhu Lei,Ji Wenjiang
Funder
National Natural Science Foundation of China
XI’AN University of Technology
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference23 articles.
1. Safeguarding cryptographic keys;Blakley,1979
2. Round-optimal and efficient verifiable secret sharing. Proc. of TCC2006, LNCS, vol.;Fitzi,2006
3. Comments on Harn–Lin’s cheating detection scheme.;Ghodosi;Des. Codes Cryptogr.,2011
4. (t, n) Muliti-secret sharing scheme based on bivariate polynomial.;Harn;Wirel. Pers. Commun.,2017
5. Detection and identification of cheaters in (t, n) secret sharing scheme.;Harn;Des. Codes Cryptogr.,2009
Cited by
56 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献