A group identification protocol with leakage resilience of secret sharing scheme
From MaRDI portal
Publication:2173730
DOI10.1155/2020/1784276zbMath1435.94146OpenAlexW3010655472MaRDI QIDQ2173730
Teng Huang, Alzubair Hassan, Lishan Ke, Ping Li, Shengjun Li, Hongyang Yan
Publication date: 17 April 2020
Published in: Complexity (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2020/1784276
Cites Work
- Unnamed Item
- Unnamed Item
- Leakage-resilient cryptography from minimal assumptions
- Leakproof secret sharing protocols with applications to group identification scheme
- Generalized oblivious transfer by secret sharing
- Linear multi-secret sharing schemes based on multi-party computation
- Zero-knowledge proofs of identity
- Non-malleable secret sharing for general access structures
- Evolving secret sharing: dynamic thresholds and robustness
- Linear codes from weakly regular plateaued functions and their secret sharing schemes
- Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
- How to share a secret
- Leakage Resilient ElGamal Encryption
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Securing Computation against Continuous Leakage
- The Knowledge Complexity of Interactive Proof Systems
- MDS secret-sharing scheme secure against cheaters
- Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
- Leakage-Resilient Zero Knowledge
- Secure computation with information leaking to an adversary
- Identification protocols and signature schemes based on supersingular isogeny problems
This page was built for publication: A group identification protocol with leakage resilience of secret sharing scheme