Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference32 articles.
1. How to shuffle in public;Adida,2007
2. N. Alon, Z. Galil, M. Yung, Efficient dynamic-resharing verifiable secret sharing against mobile adversary, in: ESA’95, pp. 523–537.
3. C. Benaloh, Secret sharing homomorphisms: keeping shares of a secret secret, in: CRYPTO’86, pp. 251–260.
4. T. Beth, H. Knobloch, M. Otten, Verifiable secret sharing for monotone access structures, in: ACM CCS’93, pp. 189–194.
5. F. Boudot, J. Traore, Efficient public verifiable secret sharing schemes with fast or delayed recovery, in: ICICS’99, pp. 87–102.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献