Recursive hiding of biometrics-based secret sharing scheme using adversary structure (Q456087): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 6 users not shown)
Property / author
 
Property / author: Yi-Xian Yang / rank
Normal rank
 
Property / author
 
Property / author: Yi-Xian Yang / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A62 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 6098066 / rank
 
Normal rank
Property / zbMATH Keywords
 
cryptography
Property / zbMATH Keywords: cryptography / rank
 
Normal rank
Property / zbMATH Keywords
 
adversary structure
Property / zbMATH Keywords: adversary structure / rank
 
Normal rank
Property / zbMATH Keywords
 
recursive
Property / zbMATH Keywords: recursive / rank
 
Normal rank
Property / zbMATH Keywords
 
biometrics verification
Property / zbMATH Keywords: biometrics verification / rank
 
Normal rank
Property / zbMATH Keywords
 
stolen share attack
Property / zbMATH Keywords: stolen share attack / rank
 
Normal rank
Property / zbMATH Keywords
 
spoofing attack
Property / zbMATH Keywords: spoofing attack / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ipl.2012.06.006 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2071914424 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q57631874 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Player simulation and general adversary structures in perfect multiparty computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: An ideal multi-secret sharing scheme based on MSP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient multi-use multi-secret sharing scheme based on hash function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Recursive constructions for perfect secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret-sharing with a class of ternary codes / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 20:01, 5 July 2024

scientific article
Language Label Description Also known as
English
Recursive hiding of biometrics-based secret sharing scheme using adversary structure
scientific article

    Statements

    Recursive hiding of biometrics-based secret sharing scheme using adversary structure (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    23 October 2012
    0 references
    0 references
    cryptography
    0 references
    adversary structure
    0 references
    recursive
    0 references
    biometrics verification
    0 references
    stolen share attack
    0 references
    spoofing attack
    0 references
    0 references
    0 references