Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings

被引:0
|
作者
Li, Huina [1 ]
机构
[1] School of Information Engineering, Xuchang University, No. 88, Bayi Road, Xuchang, China
来源
ICIC Express Letters | 2015年 / 9卷 / 10期
关键词
D O I
暂无
中图分类号
TN911 [通信理论];
学科分类号
081002 ;
摘要
引用
收藏
页码:2819 / 2825
相关论文
共 50 条
  • [31] Identity (ID)-based threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Pei, Qing-Qi
    Jiao, Li-Cheng
    Wang, Yu-Min
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (10): : 2739 - 2745
  • [32] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
  • [33] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    AXIOMS, 2024, 13 (08)
  • [34] Leakage-resilient verifiable multi-secret sharing scheme
    Shen H.
    Chen M.-W.
    Zhang M.-W.
    Beijing Youdian Daxue Xuebao, 1 (87-91): : 87 - 91
  • [35] A Verifiable Multi-Secret Sharing Scheme Based on ℓ-Intersection Pair of Cyclic Codes
    Hossain, Md Ajaharul
    Bandi, Ramakrishna
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2023,
  • [36] Verifiable multi-secret sharing based on LFSR sequences
    Hu, Chunqiang
    Liao, Xiaofeng
    Cheng, Xiuzhen
    THEORETICAL COMPUTER SCIENCE, 2012, 445 : 52 - 62
  • [37] An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme
    Chang, TY
    Hwang, MS
    Yang, WP
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) : 169 - 178
  • [38] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [39] A hierarchical weighted threshold multi-secret sharing scheme
    Chang, CC
    Pan, YP
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
  • [40] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135