Author:
Cai Xiao-Qiu,Li Shuang,Liu Zi-Fan,Wang Tian-Yin
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference33 articles.
1. Shamir, A. How to share a secret. Commun. ACM 22(11), 612–613 (1979).
2. Blakely, G. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference FIPS, AFIPS, Montvale 313–317 (IEEE Press, 1979).
3. Cramer, R., Damgård, I. & Maurer, U. General secure multi-party computation from any linear secret-sharing scheme. Phys. Rev. A 59(3), 316–334 (2000).
4. Parakh, A. & Kak, S. Space efficient secret sharing for implicit data security. Inf. Sci. 181(2), 335–341 (2011).
5. Cai, X. Q. et al. Cryptanalysis of secure multiparty quantum summation. Quantum Inf. Process. 21(8), 285 (2022).