The following pages link to How to share a secret (Q3050283):
Displayed 50 items.
- Secure distributed storage and retrieval (Q1575652) (← links)
- Protecting data privacy in private information retrieval schemes (Q1577014) (← links)
- New efficient and secure protocols for verifiable signature sharing and other applications (Q1582011) (← links)
- Secret-sharing with a class of ternary codes (Q1583097) (← links)
- Vertex-disjoint spanning trees of the star network with applications to fault-tolerance and security (Q1602520) (← links)
- Probability of shares in secret sharing schemes (Q1607017) (← links)
- Weighted decomposition construction for perfect secret sharing schemes (Q1609153) (← links)
- On the bound for anonymous secret sharing schemes (Q1613401) (← links)
- Threshold undeniable signature scheme based on conic (Q1763261) (← links)
- New secret sharing scheme based on linear code (Q1764386) (← links)
- Improvement of Tseng et al.'s authenticated encryption scheme with message linkages (Q1765881) (← links)
- Secret sharing schemes with three or four minimal qualified subsets (Q1766095) (← links)
- An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme (Q1774928) (← links)
- On 2-level secret sharing (Q1802190) (← links)
- A perfect threshold secret sharing scheme to identify cheaters (Q1804974) (← links)
- A ramp model for distributed key distribution schemes (Q1811091) (← links)
- Generation of key predistribution schemes using secret sharing schemes (Q1811107) (← links)
- Randomness in secret sharing and visual cryptography schemes (Q1826638) (← links)
- A \((t,n)\) multi-secret sharing scheme (Q1826661) (← links)
- Threshold verification scheme to a valid-signature using identity only on specialized approval (Q1826788) (← links)
- Shared generation of pseudo-random functions (Q1827581) (← links)
- Kirkman packing designs KPD(\(\{w,s^{\ast}\},v \)) and related threshold schemes (Q1827698) (← links)
- The bank safe problem (Q1835673) (← links)
- Graph decompositions and secret sharing schemes (Q1842517) (← links)
- Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. (Q1853095) (← links)
- Adaptively secure distributed public-key systems. (Q1853497) (← links)
- A combinatorial characterization of regular anonymous perfect threshold schemes (Q1853687) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- Some democratic secret sharing schemes (Q1893162) (← links)
- On the information rate of perfect secret sharing schemes (Q1894277) (← links)
- Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes (Q1910425) (← links)
- Mathematical problems in cryptology (Q1910812) (← links)
- An efficient construction of perfect secret sharing schemes for graph-based structures (Q1912864) (← links)
- Finite set theory and its application to cryptology (Q1918188) (← links)
- Recursive constructions for perfect secret sharing schemes (Q1962965) (← links)
- Secret sharing based on a hard-on-average problem (Q2369061) (← links)
- Two secret sharing schemes based on Boolean operations (Q2373477) (← links)
- Delegation with supervision (Q2384523) (← links)
- Threshold cryptography based on Asmuth-Bloom secret sharing (Q2384533) (← links)
- Dynamic and verifiable secret sharing among weighted participants (Q2425830) (← links)
- Secure distributed constraint satisfaction: reaching agreement without revealing private information (Q2457708) (← links)
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack (Q2465333) (← links)
- Towards a theory of data entanglement (Q2465624) (← links)
- New \((t, n)\) threshold directed signature scheme with provable security (Q2466072) (← links)
- Bidirectional quantum secret sharing and secret splitting with polarized single photons (Q2478776) (← links)
- An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs (Q2478954) (← links)
- New efficient and practical verifiable multi-secret sharing schemes (Q2482434) (← links)
- General constructions for information-theoretic private information retrieval (Q2485285) (← links)
- A scheme for threshold multi-secret sharing (Q2485603) (← links)
- A general approach to robust web metering (Q2486871) (← links)