Attacks to some verifiable multi-secret sharing schemes and two improved schemes
From MaRDI portal
Publication:1750542
DOI10.1016/j.ins.2015.09.040zbMath1391.94777DBLPjournals/isci/LiuZZ16OpenAlexW2200663004WikidataQ56271210 ScholiaQ56271210MaRDI QIDQ1750542
Jie Zhang, Fu-Tai Zhang, Yan-Hong Liu
Publication date: 22 May 2018
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2015.09.040
Related Items (4)
Source-location privacy full protection in wireless sensor networks ⋮ Realizing secret sharing with general access structure ⋮ Fair hierarchical secret sharing scheme based on smart contract ⋮ New \((k,l,m)\)-verifiable multi-secret sharing schemes based on XTR public key system
Cites Work
- Strong \((n, t, n)\) verifiable secret sharing scheme
- Sharing one secret vs. sharing many secrets.
- An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme
- A \((t,n)\) multi-secret sharing scheme
- New efficient and practical verifiable multi-secret sharing schemes
- A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
- A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
- Publicly Verifiable Secret Sharing
- How to share a secret
- Cheating Immune (2,n)-Threshold Visual Secret Sharing
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Attacks to some verifiable multi-secret sharing schemes and two improved schemes