Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference8 articles.
1. Discrete Mathematics;Biggs,1989
2. Verifiable secret sharing schemes based on nonhomogeneous linear recursions and elliptic curves;Hadian;Comput. Commun.,2008
3. Sharing many secrets with computational provable security;Herranz;Inf. Process. Lett.,2013
4. Computationally-secure multiple secret sharing: models, schemes, and formal security analysis;Mashhadi;ISC Int. J. Inf. Secur.,2015
5. How to fairly share multiple secrets stage by stage;Mashhadi;Wirel. Pers. Commun.,2016
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献