Randomized component based secure secret reconstruction in insecure networks
From MaRDI portal
Publication:2154040
DOI10.1007/978-3-030-91356-4_7zbMath1498.68060OpenAlexW3215563144MaRDI QIDQ2154040
Publication date: 13 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-91356-4_7
Cites Work
- Unnamed Item
- Constructing ideal secret sharing schemes based on Chinese remainder theorem
- Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
- Threshold changeable secret sharing with secure secret reconstruction
- Dynamic threshold secret reconstruction and its application to the threshold cryptography
- Multilevel threshold secret sharing based on the Chinese remainder theorem
- Secret sharing with secure secret reconstruction
- How to share a secret
- Communication Theory of Secrecy Systems*
- A modular approach to key safeguarding
This page was built for publication: Randomized component based secure secret reconstruction in insecure networks