Properties and constraints of cheating-immune secret sharing schemes
From MaRDI portal
Publication:2489917
Cites work
- scientific article; zbMATH DE number 107482 (Why is no real title available?)
- scientific article; zbMATH DE number 2080685 (Why is no real title available?)
- scientific article; zbMATH DE number 1759656 (Why is no real title available?)
- scientific article; zbMATH DE number 1857516 (Why is no real title available?)
- scientific article; zbMATH DE number 1394319 (Why is no real title available?)
- scientific article; zbMATH DE number 1440891 (Why is no real title available?)
- A perfect threshold secret sharing scheme to identify cheaters
- An explication of secret sharing schemes
- How to share a secret
- How to share a secret with cheaters
- Security of Ramp Schemes
Cited in
(5)- Cheating-tolerant and threshold-based secure information exchange among propinquity of adversaries
- Traceable secret sharing and applications
- Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem
- Cheating-immune secret sharing schemes from codes and cumulative arrays
- scientific article; zbMATH DE number 1759656 (Why is no real title available?)
This page was built for publication: Properties and constraints of cheating-immune secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2489917)