Analysis on a dynamic (t,n) threshold multi-secret sharing scheme
From MaRDI portal
Publication:3640992
zbMATH Open1199.94100MaRDI QIDQ3640992FDOQ3640992
Authors: Zhenyuan Zuo, Qi Xie
Publication date: 11 November 2009
Recommendations
- Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
- Dynamic multi-secret sharing scheme
- A note on dynamic threshold schemes
- Improvement on Lin-Wu \((t, n)\)-threshold verifiable multi-secret sharing scheme
- Dynamic threshold secret reconstruction and its application to the threshold cryptography
Cited In (9)
- A secret sharing scheme with a short share realizing the \((t,n)\) threshold and the adversary structure
- Analysis and improvement of a multisecret sharing authenticating scheme
- Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
- Improvement on Lin-Wu \((t, n)\)-threshold verifiable multi-secret sharing scheme
- Cryptanalysis of a publicly verifiable threshold secret-sharing scheme
- Comments on: ``A secure anti-collusion data sharing scheme for dynamic groups in the cloud
- Evolving secret sharing: dynamic thresholds and robustness
- CRYPTANALYSIS OF A DYNAMIC THRESHOLD DECRYPTION SCHEME
- Revisiting group oriented secret sharing schemes
This page was built for publication: Analysis on a dynamic \( (t,n)\) threshold multi-secret sharing scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3640992)