Linear multi-secret sharing schemes based on multi-party computation (Q998657): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
RedirectionBot (talk | contribs)
Removed claims
Property / author
 
Property / author: Mu-Lan Liu / rank
Normal rank
 
Property / author
 
Property / author: Liang Liang Xiao / rank
Normal rank
 

Revision as of 08:31, 22 February 2024

scientific article
Language Label Description Also known as
English
Linear multi-secret sharing schemes based on multi-party computation
scientific article

    Statements

    Linear multi-secret sharing schemes based on multi-party computation (English)
    0 references
    0 references
    9 February 2009
    0 references
    The authors present a variant of multi secret sharing protocol. The entire study has a step by step explanation, in the classical way: what is done, what is weak, what we improved. In this way, they show as a description of how to improve the security level, according with some assumptions. The mathematical background has a particular way of exposure and can be catalogized like good enough. There are three examples exposed in order to have a better understanding of the model.
    0 references
    secret sharing protocol
    0 references

    Identifiers