How to share a secret with cheaters
From MaRDI portal
Publication:1112786
DOI10.1007/BF02252871zbMath0659.94008OpenAlexW2018562795MaRDI QIDQ1112786
Publication date: 1988
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf02252871
Related Items
On constructing 1-cheating immune secret-sharing functions, Lower bounds for robust secret sharing schemes, Dynamic vector space secret sharing based on certificates, Robust vector space secret sharing schemes, Cheating-Tolerant and Threshold-Based Secure Information Exchange Among Propinquity of Adversaries, A Latin square autotopism secret sharing scheme, Cheating-immune secret sharing schemes from codes and cumulative arrays, Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems, Ramp secret sharing with cheater identification in presence of rushing cheaters, Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters, Dynamic and verifiable secret sharing among weighted participants, Cheating identifiable secret sharing scheme using symmetric bivariate polynomial, Inversion of Mutually Orthogonal Cellular Automata, UNCONDITIONALLY SECURE FAIR (t-n)-SECRET SHARING SCHEME, Three systems for shared generation of authenticators, Disjoint difference families and their applications, Algebraic manipulation detection codes, Cheating detectable threshold scheme against most powerful cheaters for long secrets, New combinatorial designs and their applications to authentication codes and secret sharing schemes., Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification, Fair reconstruction of a secret, On the information rate of secret sharing schemes, Efficient robust secret sharing from expander graphs, An explication of secret sharing schemes, Comments on Harn-Lin's cheating detection scheme, Properties and constraints of cheating-immune secret sharing schemes, Cheating in visual cryptography, An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme, On the equivalence of authentication codes and robust (2, 2)-threshold schemes, A compressed secret image sharing method with shadow image verification capability, Unnamed Item, Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families, Detection and identification of cheaters in \((t,n)\) secret sharing scheme, Threshold changeable secret sharing with secure secret reconstruction, Distortion-free secret image sharing mechanism using modulus operator, A perfect threshold secret sharing scheme to identify cheaters, How to avoid the cheaters succeeding in the key sharing scheme, Security games over lexicographic orders, Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme, How to fairly reconstruct a shared secret, Graph decompositions and secret sharing schemes, Combiner Driven Management Models and Their Applications, A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial, Further results on asymmetric authentication schemes, Dynamic threshold secret reconstruction and its application to the threshold cryptography
Cites Work