THE REVIEW ON THE THRESHOLD SECRET-SHARING SCHEME

被引:0
|
作者
Wang Sen [1 ]
Xu Zhenning [1 ]
机构
[1] East China Jiaotong Univ, Nanchang 330013, Jiangxi, Peoples R China
关键词
threshold; secret-sharing; review; CHEATER IDENTIFICATION;
D O I
暂无
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
引用
收藏
页码:241 / 243
页数:3
相关论文
共 50 条
  • [1] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [2] MDS secret-sharing scheme secure against cheaters
    Okada, K
    Kurosawa, K
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 1078 - 1081
  • [3] ON SECRET-SHARING MATROIDS
    SEYMOUR, PD
    [J]. JOURNAL OF COMBINATORIAL THEORY SERIES B, 1992, 56 (01) : 69 - 73
  • [4] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (02) : 444 - 469
  • [5] Secret-Sharing for NP
    Ilan Komargodski
    Moni Naor
    Eylon Yogev
    [J]. Journal of Cryptology, 2017, 30 : 444 - 469
  • [6] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 254 - 273
  • [7] GAN-Based Key Secret-Sharing Scheme in Blockchain
    Zheng, Wenbo
    Wang, Kunfeng
    Wang, Fei-Yue
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (01) : 393 - 404
  • [8] A Rational Secret-Sharing Scheme Based on RSA-OAEP
    Isshiki, Toshiyuki
    Wada, Koichiro
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 42 - 49
  • [9] A key generation algorithm of CPK based on threshold secret-sharing algorithm
    Shao, Chunyu
    Wei, Youguo
    Luo, Shaopeng
    Tang, Xiaokang
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 879 - 885
  • [10] On the power of nonlinear secret-sharing
    Beimel, A
    Ishai, Y
    [J]. 16TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2000, : 188 - 202