New results and applications for multi-secret sharing schemes
From MaRDI portal
Publication:404940
DOI10.1007/S10623-013-9831-6zbMATH Open1308.94097OpenAlexW2137077755MaRDI QIDQ404940FDOQ404940
Authors: Javier Herranz, Alexandre Ruiz, Germán Sáez
Publication date: 4 September 2014
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2117/27633
Recommendations
- New efficient and practical verifiable multi-secret sharing schemes
- scientific article; zbMATH DE number 1612523
- Sharing multiple secrets: Models, schemes and analysis
- A new verifiable \((t,n)\) multi-secret-sharing scheme
- A \((t,n)\) multi-secret sharing scheme
- A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
- Publication:4940693
- On \(d\)-multiplicative secret sharing
- A new verifiable multi-secret sharing scheme based on elliptic curves and pairings
- Secret-Sharing Schemes: A Survey
Measures of information, entropy (94A17) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Short signatures from the Weil pairing
- How to share a secret
- Identity-Based Encryption from the Weil Pairing
- Title not available (Why is that?)
- Attribute-based encryption schemes with constant-size ciphertexts
- Securing threshold cryptosystems against chosen ciphertext attack
- Title not available (Why is that?)
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Robust threshold DSS signatures
- Attribute-based signatures
- Practical threshold signatures
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Title not available (Why is that?)
- Secure distributed key generation for discrete-log based cryptosystems
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
- Title not available (Why is that?)
- Sharing multiple secrets: Models, schemes and analysis
- Short attribute-based signatures for threshold predicates
- Dynamic multi-secret sharing scheme
- On-line secret sharing
- Title not available (Why is that?)
- Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
- A construction for multisecret threshold schemes
Cited In (10)
- Quantum multi-secret sharing via trap codes and discrete quantum walks
- Improved constructions of secret sharing schemes by applying \((\lambda ,\omega )\)-decompositions
- Attacks to some verifiable multi-secret sharing schemes and two improved schemes
- Strong security of linear ramp secret sharing schemes with general access structures
- A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations
- Computationally secure robust multi-secret sharing for general access structure
- Sharing many secrets with computational provable security
- A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
- Localised multisecret sharing
- Title not available (Why is that?)
This page was built for publication: New results and applications for multi-secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q404940)