Multi-secret sharing scheme with general access structures

被引:0
|
作者
Li, Hui-Xian [1 ]
Cheng, Chun-Tian [2 ]
Pang, Liao-Jun [3 ]
机构
[1] Dept. of Computer Science and Engineering, Dalian Univ. of Tech., Dalian 116024, China
[2] Institute of Hydropower System and Hydroinformatics, Dalian Univ. of Tech., Dalian 116024, China
[3] National Key Laboratory of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
来源
Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science) | 2006年 / 34卷 / 06期
关键词
Access structure - Information security - Multi secret sharing - Secret distribution - Secret reconstruction algorithms - Shamir threshold;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:95 / 98
相关论文
共 50 条
  • [21] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [22] Multi-Secret Sharing Threshold Access Structure
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1585 - 1590
  • [23] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [24] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [25] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [26] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [27] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
  • [28] Multi-secret Sharing Scheme Using Modular Inverse for Compartmented Access Structure
    Basit, Abdul
    Venkaiah, V. Ch
    Moiz, Salman Abdul
    DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT-2K19, 2020, 1079 : 371 - 385
  • [29] Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure
    Roy, Partha Sarathi
    Das, Angsuman
    Adhikari, Avishek
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 278 - 287
  • [30] A New Double Layer Multi-Secret Sharing Scheme
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    China Communications, 2024, 21 (01) : 297 - 309