Dynamic threshold secret reconstruction and its application to the threshold cryptography (Q2353654): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q543826
Import241208061232 (talk | contribs)
Normalize DOI.
 
(4 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.ipl.2015.06.014 / rank
Normal rank
 
Property / author
 
Property / author: Ching-Fang Hsu / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ipl.2015.06.014 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1194807963 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Share a Secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: A modular approach to key safeguarding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3778674 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4949337 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Publicly Verifiable Secret Sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret with cheaters / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934735 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343413 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shared secret reconstruction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4954414 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detection and identification of cheaters in \((t,n)\) secret sharing scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250770 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The round complexity of verifiable secret sharing and secure multicast / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improving the Round Complexity of VSS in Point-to-Point Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Round Complexity of Verifiable Secret Sharing: The Statistical Case / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Round Complexity of Verifiable Secret Sharing Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4269754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold changeable secret sharing schemes revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250638 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-based treshold-changeability for standard CRT secret-sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: On dealer-free dynamic threshold schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3935355 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Group-oriented (t, n) threshold digital signature scheme and digital multisignature / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035739 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a function securely / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust and Efficient Sharing of RSA Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374942 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5851061 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.IPL.2015.06.014 / rank
 
Normal rank

Latest revision as of 03:55, 18 December 2024

scientific article
Language Label Description Also known as
English
Dynamic threshold secret reconstruction and its application to the threshold cryptography
scientific article

    Statements

    Dynamic threshold secret reconstruction and its application to the threshold cryptography (English)
    0 references
    0 references
    0 references
    15 July 2015
    0 references
    cryptography
    0 references
    secret sharing scheme
    0 references
    bivariate polynomial
    0 references
    secure channel
    0 references
    dynamic threshold
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers