共 50 条
- [1] Outsourced cheating detection for secret sharing [J]. International Journal of Information Security, 2021, 20 : 871 - 878
- [3] Almost Optimum Secret Sharing with Cheating Detection [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 359 - 372
- [4] Secret Sharing Scheme with Efficient Cheating Detection [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
- [5] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
- [6] Improvements to Almost Optimum Secret Sharing with Cheating Detection [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 193 - 205
- [7] On cheating immune secret sharing [J]. DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, 2004, 6 (02): : 253 - 264
- [8] Cheating Resistance for Secret Sharing [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +
- [10] Linear (k, n) secret sharing scheme with cheating detection [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948