Properties and constraints of cheating-immune secret sharing schemes
From MaRDI portal
Publication:2489917
DOI10.1016/J.DAM.2005.03.026zbMATH Open1091.94029OpenAlexW1998787944MaRDI QIDQ2489917FDOQ2489917
Authors: Paolo D'Arco, Wataru Kishimoto, D. R. Stinson
Publication date: 28 April 2006
Published in: Discrete Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.dam.2005.03.026
Recommendations
Cites Work
- Title not available (Why is that?)
- How to share a secret
- How to share a secret with cheaters
- An explication of secret sharing schemes
- Title not available (Why is that?)
- Security of Ramp Schemes
- A perfect threshold secret sharing scheme to identify cheaters
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (5)
- Cheating-tolerant and threshold-based secure information exchange among propinquity of adversaries
- Traceable secret sharing and applications
- Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem
- Cheating-immune secret sharing schemes from codes and cumulative arrays
- Title not available (Why is that?)
This page was built for publication: Properties and constraints of cheating-immune secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2489917)