An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials
From MaRDI portal
Publication:2334963
DOI10.3390/SYM11010088zbMATH Open1423.94135OpenAlexW2910771475WikidataQ128577502 ScholiaQ128577502MaRDI QIDQ2334963FDOQ2334963
Authors: Zhe Xia, Yining Liu, Chingfang Hsu, Chin-Chen Chang
Publication date: 13 November 2019
Published in: Symmetry (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3390/sym11010088
Recommendations
- An efficient and information theoretically secure rational secret sharing scheme based on symmetric bivariate polynomials
- Using an efficient hash chain and delaying function to improve an e-lottery scheme
- A secure anonymous internet electronic voting scheme based on the polynomial
- A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
- Symmetric Private Polynomial Computation From Lagrange Encoding
Symmetric functions and generalizations (05E05) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- How to share a secret
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Vector spaces of linearizations for matrix polynomials: a bivariate polynomial approach
- Title not available (Why is that?)
- The round complexity of verifiable secret sharing and secure multicast
- On Unconditionally Secure Robust Distributed Key Distribution Centers
- A pre-test for factoring bivariate polynomials with coefficients in \(\mathbb F_2\)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Minimal determinantal representations of bivariate polynomials
- Title not available (Why is that?)
- Title not available (Why is that?)
- Using an efficient hash chain and delaying function to improve an e-lottery scheme
Cited In (2)
This page was built for publication: An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2334963)