共 50 条
- [31] Identity (ID)-based threshold multi-secret sharing scheme Ruan Jian Xue Bao/Journal of Software, 2008, 19 (10): : 2739 - 2745
- [32] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography 2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
- [34] Leakage-resilient verifiable multi-secret sharing scheme Beijing Youdian Daxue Xuebao, 1 (87-91): : 87 - 91
- [38] Multi-secret sharing threshold visual cryptography scheme CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
- [39] A hierarchical weighted threshold multi-secret sharing scheme Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
- [40] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem 2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135