A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
From MaRDI portal
Publication:2570757
DOI10.1016/j.amc.2004.06.120zbMath1089.94029OpenAlexW2079631812MaRDI QIDQ2570757
Publication date: 28 October 2005
Published in: Applied Mathematics and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.amc.2004.06.120
Related Items (14)
An efficient and secure multi-secret sharing scheme with general access structures ⋮ Memory leakage-resilient secret sharing schemes ⋮ ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls ⋮ Source-location privacy full protection in wireless sensor networks ⋮ Verifiable multi-secret sharing based on LFSR sequences ⋮ Constructing ideal secret sharing schemes based on Chinese remainder theorem ⋮ RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS ⋮ Efficient verifiable multi-secret sharing scheme based on hash function ⋮ Attacks to some verifiable multi-secret sharing schemes and two improved schemes ⋮ Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem ⋮ New efficient and practical verifiable multi-secret sharing schemes ⋮ An ideal multi-secret sharing scheme based on MSP ⋮ Unnamed Item ⋮ An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry
Cites Work
This page was built for publication: A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing