The following pages link to How to share a secret (Q3050283):
Displaying 50 items.
- Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing (Q264629) (← links)
- Construction of authentication codes with double arbiters over symplectic geometry (Q277114) (← links)
- Combinatorial lower bounds for secret sharing schemes (Q286957) (← links)
- Lower bounds for robust secret sharing schemes (Q287197) (← links)
- Secret-sharing schemes for very dense graphs (Q290386) (← links)
- \(d\)-dimensional quantum state sharing with adversary structure (Q291513) (← links)
- Robust vector space secret sharing schemes (Q293422) (← links)
- Efficient quantum secret sharing (Q296134) (← links)
- A novel group key transfer for big data security (Q298626) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Quantum ramp secret sharing scheme and quantum operations (Q332521) (← links)
- Secure multi-party computation protocol for sequencing problem (Q350932) (← links)
- Secret sharing based on quantum Fourier transform (Q356899) (← links)
- A provable secure fuzzy identity based signature scheme (Q362302) (← links)
- An improved multiparty quantum secret sharing with Bell states and Bell measurement (Q363023) (← links)
- Privacy and verifiability in voting systems: methods, developments and trends (Q395657) (← links)
- Paillier-based publicly verifiable (non-interactive) secret sharing (Q398963) (← links)
- Extremal properties of \(t\)-SEEDs and recursive constructions (Q404934) (← links)
- New results and applications for multi-secret sharing schemes (Q404940) (← links)
- Identity-based threshold decryption on access structure (Q407450) (← links)
- On a kind of two-weight code (Q427817) (← links)
- Efficient symmetric five-party quantum state sharing of an arbitrary \(m\)-qubit state (Q429902) (← links)
- On the uselessness of quantum queries (Q433109) (← links)
- Ideal multipartite secret sharing schemes (Q434350) (← links)
- The formulae and algorithms for Lagrange-power basis transformation and Lagrange-Newton transformation (Q434593) (← links)
- \((2,n)\) secret sharing scheme for gray and color images based on Boolean operation (Q439798) (← links)
- Leakproof secret sharing protocols with applications to group identification scheme (Q439799) (← links)
- Verifiable multi-secret sharing based on LFSR sequences (Q442283) (← links)
- Multiparty quantum secret information sharing in enterprise management based on single qubit with random rotation angle (Q454216) (← links)
- Asynchronous privacy-preserving iterative computation on peer-to-peer networks (Q455943) (← links)
- Linear threshold multisecret sharing schemes (Q456082) (← links)
- Recursive hiding of biometrics-based secret sharing scheme using adversary structure (Q456087) (← links)
- Verifiable secret sharing in a total of three rounds (Q456152) (← links)
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts (Q456458) (← links)
- Asymmetric quantum information splitting of an arbitrary \(N\)-qubit state via GHZ-\textit{like} state and Bell states (Q457992) (← links)
- Creation of identity-based digital signature schemes from bilinear maps (Q466389) (← links)
- The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures (Q477568) (← links)
- An ID-based signcryption scheme with compartmented secret sharing for unsigncryption (Q477604) (← links)
- Quantum simultaneous secret distribution with dense coding by using cluster states (Q479367) (← links)
- Multi-party quantum state sharing of an arbitrary multi-qubit state via \(\chi\)-type entangled states (Q481647) (← links)
- A non-entanglement quantum single sign-on protocol (Q487361) (← links)
- A two-state entanglement based quantum single sign-on protocol (Q487443) (← links)
- Tripartite quantum operation sharing with two asymmetric three-qubit W states in five entanglement structures (Q488146) (← links)
- A novel protocol for multiparty quantum key management (Q496910) (← links)
- Certificateless threshold signature secure in the standard model (Q497178) (← links)
- New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures (Q497216) (← links)
- Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes (Q497226) (← links)
- Erdős-Pyber theorem for hypergraphs and secret sharing (Q497325) (← links)
- Secret sharing with multi-cover adaptive steganography (Q497918) (← links)
- Efficient verifiable multi-secret sharing scheme based on hash function (Q506699) (← links)