共 50 条
- [3] A Coding Theorem for Cheating-Detectable (2,2)-Threshold Blockwise Secret Sharing Schemes [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1308 - +
- [4] Cheating Detectable Secret Sharing Scheme Suitable for Implementation [J]. 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 623 - 628
- [5] A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 340 - 344
- [6] Almost Optimum Secret Sharing with Cheating Detection [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 359 - 372
- [7] Leakage Resilient Cheating Detectable Secret Sharing Schemes [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 3 - 23
- [9] Cheating immune (2, n)-threshold visual secret sharing [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 216 - 228
- [10] Linear (k, n) secret sharing scheme with cheating detection [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948