Threshold changeable secret sharing schemes revisited (Q764347): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Updating the Parameters of a Threshold Scheme by Minimal Broadcast / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318722 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully dynamic secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341739 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3149760 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4322858 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250638 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Secret Reconstruction in Secret Sharing Schemes / rank
 
Normal rank

Latest revision as of 00:28, 5 July 2024

scientific article
Language Label Description Also known as
English
Threshold changeable secret sharing schemes revisited
scientific article

    Statements

    Threshold changeable secret sharing schemes revisited (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    13 March 2012
    0 references
    0 references
    secret sharing schemes
    0 references
    threshold changeable secret sharing schemes
    0 references
    perfect security
    0 references
    computational security
    0 references
    0 references