Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings

被引:0
|
作者
Li, Huina [1 ]
机构
[1] School of Information Engineering, Xuchang University, No. 88, Bayi Road, Xuchang, China
来源
ICIC Express Letters | 2015年 / 9卷 / 10期
关键词
D O I
暂无
中图分类号
TN911 [通信理论];
学科分类号
081002 ;
摘要
引用
收藏
页码:2819 / 2825
相关论文
共 50 条
  • [41] Verifiable multi-secret sharing schemes for multiple threshold access structures
    Tartary, Christophe
    Pieprzyk, Josef
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 167 - +
  • [42] Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
    Sheikhi-Garjan, Maryam
    Bahramian, Mojtaba
    Doche, Christophe
    IET INFORMATION SECURITY, 2019, 13 (03) : 278 - 284
  • [43] Publicly verifiable secret sharing schemes using bilinear pairings
    Tian, Youliang
    Peng, Changgen
    Ma, Jianfeng
    International Journal of Network Security, 2012, 14 (03) : 142 - 148
  • [44] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1749 - 1758
  • [45] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2015, 82 : 1749 - 1758
  • [46] Verifiable multi-use dynamic threshold large secret sharing scheme
    Chang, Li-Wei
    Zheng, Shi-Hui
    Xing, You-Song
    Jin, Lei
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (05): : 86 - 90
  • [47] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    Li Meng
    Yu Jia
    Hao Rong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 313 - 318
  • [48] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    LI Meng
    YU Jia
    HAO Rong
    Chinese Journal of Electronics, 2017, 26 (02) : 313 - 318
  • [49] A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
    Li, Jing
    Wang, Licheng
    Yan, Jianhua
    Niu, Xinxin
    Yang, Yixian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4552 - 4567
  • [50] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204