Attacks to some verifiable multi-secret sharing schemes and two improved schemes (Q1750542): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Created claim: DBLP publication ID (P1635): journals/isci/LiuZZ16, #quickstatements; #temporary_batch_1731508824982
 
(7 intermediate revisions by 6 users not shown)
Property / author
 
Property / author: Yan-Hong Liu / rank
Normal rank
 
Property / author
 
Property / author: Fu-Tai Zhang / rank
Normal rank
 
Property / author
 
Property / author: Yan-Hong Liu / rank
 
Normal rank
Property / author
 
Property / author: Fu-Tai Zhang / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q56271210 / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2015.09.040 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2200663004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3995743 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4501498 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sharing one secret vs. sharing many secrets. / rank
 
Normal rank
Property / cites work
 
Property / cites work: New efficient and practical verifiable multi-secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strong \((n, t, n)\) verifiable secret sharing scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341778 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536654 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4667606 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cheating Immune (2,n)-Threshold Visual Secret Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Publicly Verifiable Secret Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2770462 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A \((t,n)\) multi-secret sharing scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4473584 / rank
 
Normal rank
Property / DBLP publication ID
 
Property / DBLP publication ID: journals/isci/LiuZZ16 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 16:00, 13 November 2024

scientific article
Language Label Description Also known as
English
Attacks to some verifiable multi-secret sharing schemes and two improved schemes
scientific article

    Statements

    Attacks to some verifiable multi-secret sharing schemes and two improved schemes (English)
    0 references
    0 references
    0 references
    0 references
    22 May 2018
    0 references
    secret sharing
    0 references
    verifiable multi-secret-sharing scheme
    0 references
    private channel
    0 references
    shadow
    0 references
    RSA cryptosystem
    0 references

    Identifiers