Funder
National University of Defense Technology
National Natural Science Foundation of China
Reference37 articles.
1. Naor M, Wool A. Access control and signatures via quorum secret sharing. In: Proceedings of the 3rd ACM conference on computer and communications security. 1996, p. 157–68.
2. A simple publicly verifiable secret sharing scheme and its application to electronic voting;Schoenmakers,1999
3. Secret sharing for cloud data security;Attasena;Vldb J,2017
4. Blockchain-based secure and efficient secret image sharing with outsourcing computation in wireless networks;Zhou;IEEE Trans Wireless Commun,2023
5. Reversible data hiding in encrypted image via secret sharing based on GF (p) and GF (2 8);Qin;IEEE Trans Circuits Syst Video Technol,2021