Author:
Meng Keju,Miao Fuyou,Huang Wenchao,Xiong Yan
Funder
National Key R&D Project
National Natural Science Foundation of China
Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference36 articles.
1. Linear subspace cryptanalysis of Harn's secret sharing-based group authentication scheme;Ahmadian;IEEE Trans. Inf. Forensics Secur.,2018
2. A modular approach to key safeguarding;Asmuth;IEEE Trans. Inf. Theory,1983
3. Updating the parameters of a threshold scheme by minimal broadcast;Barwick;IEEE Trans. Inf. Theory,2005
4. Secret sharing homomorphisms: keeping shares of a secret secret;Benaloh,1986
5. Safeguarding cryptographic keys;Blakley,1979
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献