Funder
Industrial Science and Technology Project of Shaanxi Province
Science Research Project of the Key Laboratory of Shaanxi Provincial Department of Education
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference10 articles.
1. GR Blakley, in AFIPS1979 national computer conference. Safeguarding cryptographic keys. vol.48, (1979), pp. 313–317.
2. A Shamir, How to share a secret. Commun. ACM. 22(11), 612–613 (1979).
3. CM Tang, SH Gao, CL Zhang, The optimal linear secret sharing scheme for any given access structure. J. Syst. Sci. Complex. 26(4), 634–649 (2013).
4. CM Tang, CL Cai, Verifiable mobile online social network privacy-preserving location sharing scheme. Concurr. Comput. Pract. Experience. 29(24), 1–10 (2017).
5. L Harn, Secure secret reconstruction and multi-secret sharing schemes with unconditional secure. Secur. Commun. Netw. 7(3), 567–573 (2014).
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献