Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings

被引:0
|
作者
Li, Huina [1 ]
机构
[1] School of Information Engineering, Xuchang University, No. 88, Bayi Road, Xuchang, China
来源
ICIC Express Letters | 2015年 / 9卷 / 10期
关键词
D O I
暂无
中图分类号
TN911 [通信理论];
学科分类号
081002 ;
摘要
引用
收藏
页码:2819 / 2825
相关论文
共 50 条
  • [21] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
    Amroudi, Ali Nakhaei
    Zaghain, Ali
    Sajadieh, Mahdi
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1393 - 1405
  • [22] Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
    Wang, Na
    Cai, Yuanyuan
    Fu, Junsong
    Chen, Xiqi
    IEEE ACCESS, 2020, 8 : 20799 - 20804
  • [23] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
    Ali Nakhaei Amroudi
    Ali Zaghain
    Mahdi Sajadieh
    Wireless Personal Communications, 2017, 96 : 1393 - 1405
  • [24] Verifiable multi-secret sharing scheme based on S-multiplication
    He, MX
    Fan, PZ
    Kaderali, F
    WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 602 - 608
  • [25] Efficient verifiable multi-secret sharing scheme based on hash function
    Shao, Jun
    INFORMATION SCIENCES, 2014, 278 : 104 - 109
  • [26] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    Li Fulin
    Yan Jiayun
    Zhu Shixin
    Hu Hang
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (03) : 556 - 563
  • [27] A verifiable multi-secret image sharing scheme based on DNA encryption
    Arup Kumar Chattopadhyay
    Sanchita Saha
    Amitava Nag
    Jyoti Prakash Singh
    Multimedia Tools and Applications, 2025, 84 (4) : 1967 - 1983
  • [28] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    LI Fulin
    YAN Jiayun
    ZHU Shixin
    HU Hang
    Chinese Journal of Electronics, 2023, 32 (03) : 556 - 563
  • [29] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [30] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234