Verifiable secret redistribution protocol based on additive sharing

被引:2
|
作者
Institute of Network Security, Shandong University, Jinan 250100, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2006年 / 1卷 / 23-27期
关键词
Security of data;
D O I
10.1360/crad20060104
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
    Kaya, Kamer
    Selcuk, Ali Aydin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 414 - 425
  • [32] Optimistic fair exchange based on publicly verifiable secret sharing
    Avoine, G
    Vaudenay, S
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 74 - 85
  • [33] Quantum walk based quantum secret sharing in a verifiable framework
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Ning, Yu
    2021 2ND INTERNATIONAL CONFERENCE ON BIG DATA & ARTIFICIAL INTELLIGENCE & SOFTWARE ENGINEERING (ICBASE 2021), 2021, : 271 - 276
  • [34] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [35] Publicly verifiable secret sharing technology in blockchain
    He M.
    Bai F.-H.
    Yu Z.
    Shen T.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (02): : 306 - 312
  • [36] A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing
    Tian, Youliang
    Peng, Changgen
    Zhang, Renping
    Chen, Yuling
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 71 - 75
  • [37] Publicly verifiable secret sharing with enrollment ability
    Yu, Jia
    Kong, Fanyu
    Hao, Rong
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [38] Verifiable secret sharing with changeable access structure
    Ghebleh, Mohammad
    Kanso, Ali
    Abuhasan, Haya
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2024,
  • [39] Necessity and realization of universally verifiable secret sharing
    Mao, WB
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 208 - 214
  • [40] Verifiable Image Secret Sharing with Cheater Identification
    Patil, Sonali D.
    Ithape, Priya K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1238 - 1241