Analysis on a dynamic (t,n) threshold multi-secret sharing scheme
From MaRDI portal
Publication:3640992
zbMATH Open1199.94100MaRDI QIDQ3640992FDOQ3640992
Publication date: 11 November 2009
Recommendations
- Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
- Dynamic multi-secret sharing scheme
- A note on dynamic threshold schemes
- Improvement on Lin-Wu \((t, n)\)-threshold verifiable multi-secret sharing scheme
- Dynamic threshold secret reconstruction and its application to the threshold cryptography
Cited In (4)
- A secret sharing scheme with a short share realizing the \((t,n)\) threshold and the adversary structure
- Analysis and improvement of a multisecret sharing authenticating scheme
- Improvement on Lin-Wu \((t, n)\)-threshold verifiable multi-secret sharing scheme
- Evolving secret sharing: dynamic thresholds and robustness
This page was built for publication: Analysis on a dynamic \( (t,n)\) threshold multi-secret sharing scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3640992)