共 50 条
- [21] Cheating-immune secret sharing schemes from codes and cumulative arrays [J]. Cryptography and Communications, 2013, 5 : 67 - 83
- [22] Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 213 - 222
- [23] A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 340 - 344
- [24] Efficient (k,n)Threshold secret sharing schemes secure against cheating from n-1 cheaters [J]. Information Security and Privacy, Proceedings, 2007, 4586 : 133 - 142
- [25] Robust Secret Sharing Schemes Against Local Adversaries [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 327 - 356
- [26] Strictly cheating immune secret sharing [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
- [27] Cheating prevention in linear secret sharing [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 121 - 135
- [29] Outsourced cheating detection for secret sharing [J]. International Journal of Information Security, 2021, 20 : 871 - 878
- [30] The access structure of some secret-sharing schemes [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78