共 50 条
- [4] A secret sharing scheme based on (t, n) threshold and adversary structure International Journal of Information Security, 2009, 8
- [5] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem Wireless Personal Communications, 2017, 96 : 1393 - 1405
- [8] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
- [9] A Fair (t,n) Threshold Secret Sharing Scheme PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 140 - 143
- [10] A New (t, n)-Threshold Secret Sharing Scheme 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 920 - +