共 50 条
- [2] A Hierarchical Threshold Multi-secret Sharing Scheme [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
- [3] Multi-secret sharing threshold visual cryptography scheme [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
- [4] A hierarchical weighted threshold multi-secret sharing scheme [J]. Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
- [5] Identity (ID)-based threshold multi-secret sharing scheme [J]. Ruan Jian Xue Bao/Journal of Software, 2008, 19 (10): : 2739 - 2745
- [6] A new (t, n)-threshold multi-secret sharing scheme [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 421 - 426
- [7] A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 358 - +
- [8] An efficient (t, n)-threshold multi-secret sharing scheme [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 580 - +
- [9] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem [J]. 2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
- [10] A VERIFIABLE MULTI-SECRET SHARING SCHEME [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138