On secret sharing protocols
DOI10.1090/conm/677/13621zbMath1366.94550OpenAlexW3107197339MaRDI QIDQ2975247
Benjamin Fine, Chi Sing Chum, Anja Moldenhauer, Xiaowen Zhang, Gerhard Rosenberger
Publication date: 11 April 2017
Published in: Algebra and Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1090/conm/677/13621
polynomial interpolationNielsen transformationssecret sharing protocolShamir schemeverifiable secret sharing scheme
Subgroup theorems; subgroup growth (20E07) Geometric group theory (20F65) Free products of groups, free products with amalgamation, Higman-Neumann-Neumann extensions, and generalizations (20E06) Hyperbolic groups and nonpositively curved groups (20F67) Authentication, digital signatures and secret sharing (94A62)
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An explication of secret sharing schemes
- Combinatorial group theory.
- A course in mathematical cryptography
- On the generalized Hurwitz equation and the Baragar-Umeda equation
- A Proposed Alternative to the Shamir Secret Sharing Scheme
- Improving Latin Square Based Secret Sharing Schemes
- How to share a secret
- Efficient Computation in Groups Via Compression
- A secret sharing scheme based on the Closest Vector Theorem and a modification to a private key cryptosystem