Recursive hiding of biometrics-based secret sharing scheme using adversary structure (Q456087): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q57631874, #quickstatements; #temporary_batch_1714856798036
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Player simulation and general adversary structures in perfect multiparty computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: An ideal multi-secret sharing scheme based on MSP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient multi-use multi-secret sharing scheme based on hash function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Recursive constructions for perfect secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret-sharing with a class of ternary codes / rank
 
Normal rank

Revision as of 19:01, 5 July 2024

scientific article
Language Label Description Also known as
English
Recursive hiding of biometrics-based secret sharing scheme using adversary structure
scientific article

    Statements

    Recursive hiding of biometrics-based secret sharing scheme using adversary structure (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    23 October 2012
    0 references
    cryptography
    0 references
    adversary structure
    0 references
    recursive
    0 references
    biometrics verification
    0 references
    stolen share attack
    0 references
    spoofing attack
    0 references

    Identifiers