Dynamic threshold secret reconstruction and its application to the threshold cryptography
From MaRDI portal
Publication:2353654
Recommendations
Cites work
- scientific article; zbMATH DE number 4039795 (Why is no real title available?)
- scientific article; zbMATH DE number 3750146 (Why is no real title available?)
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 176567 (Why is no real title available?)
- scientific article; zbMATH DE number 1303970 (Why is no real title available?)
- scientific article; zbMATH DE number 1304080 (Why is no real title available?)
- scientific article; zbMATH DE number 1360745 (Why is no real title available?)
- scientific article; zbMATH DE number 1030973 (Why is no real title available?)
- scientific article; zbMATH DE number 1394319 (Why is no real title available?)
- scientific article; zbMATH DE number 1440891 (Why is no real title available?)
- scientific article; zbMATH DE number 1456816 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A modular approach to key safeguarding
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
- Detection and identification of cheaters in \((t,n)\) secret sharing scheme
- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
- Efficient statistical asynchronous verifiable secret sharing with optimal resilience
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- How to share a function securely
- How to share a secret
- How to share a secret
- How to share a secret with cheaters
- Improving the Round Complexity of VSS in Point-to-Point Networks
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes
- On dealer-free dynamic threshold schemes
- One-round ID-based threshold signature scheme from bilinear pairings
- Practical threshold signatures
- Publicly verifiable secret sharing
- Robust and efficient sharing of RSA functions
- Selected Areas in Cryptography
- Shared secret reconstruction
- The Round Complexity of Verifiable Secret Sharing Revisited
- The round complexity of verifiable secret sharing and secure multicast
- The round complexity of verifiable secret sharing: the statistical case
- Theory of Cryptography
- Threshold changeable secret sharing schemes revisited
Cited in
(16)- A pseudo dynamic threshold scheme
- On dynamic threshold schemes
- scientific article; zbMATH DE number 5180844 (Why is no real title available?)
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
- Dynamic threshold secret sharing scheme
- Information Security and Privacy
- Secret sharing with secure secret reconstruction
- Analysis on a dynamic \( (t,n)\) threshold multi-secret sharing scheme
- Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities
- Randomized component based secure secret reconstruction in insecure networks
- Ramp scheme based on CRT for polynomial ring over finite field
- On dealer-free dynamic threshold schemes
- Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
- Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
- Threshold changeable secret sharing with secure secret reconstruction
This page was built for publication: Dynamic threshold secret reconstruction and its application to the threshold cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2353654)