New results and applications for multi-secret sharing schemes
From MaRDI portal
Publication:404940
DOI10.1007/s10623-013-9831-6zbMath1308.94097OpenAlexW2137077755MaRDI QIDQ404940
Alexandre Ruiz, Javier Herranz, Germán Sáez
Publication date: 4 September 2014
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2117/27633
Cryptography (94A60) Measures of information, entropy (94A17) Authentication, digital signatures and secret sharing (94A62)
Related Items
Computationally Secure Robust Multi-secret Sharing for General Access Structure ⋮ A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations ⋮ Strong security of linear ramp secret sharing schemes with general access structures ⋮ Localised multisecret sharing ⋮ Quantum multi-secret sharing via trap codes and discrete quantum walks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attribute-based encryption schemes with constant-size ciphertexts
- A construction for multisecret threshold schemes
- Secure distributed key generation for discrete-log based cryptosystems
- Securing threshold cryptosystems against chosen ciphertext attack
- Short signatures from the Weil pairing
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
- Sharing multiple secrets: Models, schemes and analysis
- Robust Threshold DSS Signatures
- Short Attribute-Based Signatures for Threshold Predicates
- How to share a secret
- Attribute-Based Signatures
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- On-line secret sharing
- Identity-Based Encryption from the Weil Pairing
- Computer Aided Verification
This page was built for publication: New results and applications for multi-secret sharing schemes