New results and applications for multi-secret sharing schemes
From MaRDI portal
(Redirected from Publication:404940)
Recommendations
- New efficient and practical verifiable multi-secret sharing schemes
- scientific article; zbMATH DE number 1612523
- Sharing multiple secrets: Models, schemes and analysis
- A new verifiable \((t,n)\) multi-secret-sharing scheme
- A \((t,n)\) multi-secret sharing scheme
- A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
- Publication:4940693
- On \(d\)-multiplicative secret sharing
- A new verifiable multi-secret sharing scheme based on elliptic curves and pairings
- Secret-Sharing Schemes: A Survey
Cites work
- scientific article; zbMATH DE number 1618043 (Why is no real title available?)
- scientific article; zbMATH DE number 107482 (Why is no real title available?)
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 4123667 (Why is no real title available?)
- scientific article; zbMATH DE number 1759781 (Why is no real title available?)
- scientific article; zbMATH DE number 1406777 (Why is no real title available?)
- A construction for multisecret threshold schemes
- Attribute-based encryption schemes with constant-size ciphertexts
- Attribute-based signatures
- Dynamic multi-secret sharing scheme
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- How to share a secret
- Identity-Based Encryption from the Weil Pairing
- On-line secret sharing
- Practical threshold signatures
- Robust threshold DSS signatures
- Secure distributed key generation for discrete-log based cryptosystems
- Securing threshold cryptosystems against chosen ciphertext attack
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
- Sharing multiple secrets: Models, schemes and analysis
- Short attribute-based signatures for threshold predicates
- Short signatures from the Weil pairing
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures
Cited in
(10)- A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations
- Strong security of linear ramp secret sharing schemes with general access structures
- A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
- scientific article; zbMATH DE number 5012233 (Why is no real title available?)
- Improved constructions of secret sharing schemes by applying \((\lambda ,\omega )\)-decompositions
- Computationally secure robust multi-secret sharing for general access structure
- Sharing many secrets with computational provable security
- Quantum multi-secret sharing via trap codes and discrete quantum walks
- Localised multisecret sharing
- Attacks to some verifiable multi-secret sharing schemes and two improved schemes
This page was built for publication: New results and applications for multi-secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q404940)