共 50 条
- [22] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
- [24] Password-Protected Secret Sharing PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 433 - 443
- [25] An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 45 - 47
- [26] New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 139 - 170
- [27] Password-protected Secret-sharing Schemes without Random Oracles 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 566 - 570
- [29] Game on: a performance comparison of interpolation techniques applied to Shamir's secret sharing COMPUTER JOURNAL, 2024,