Leakproof secret sharing protocols with applications to group identification scheme
From MaRDI portal
Publication:439799
DOI10.1007/s11432-011-4480-8zbMath1245.94103OpenAlexW2255912369MaRDI QIDQ439799
Publication date: 17 August 2012
Published in: Science China. Information Sciences (Search for Journal in Brave)
Full work available at URL: http://engine.scichina.com/doi/10.1007/s11432-011-4480-8
secret sharingproof of knowledgegroup identification schemeleakproof secret sharingmulti-prover zero-knowledge argument
Related Items (4)
Memory leakage-resilient secret sharing schemes ⋮ A group identification protocol with leakage resilience of secret sharing scheme ⋮ The optimal linear secret sharing scheme for any given access structure ⋮ How to share a secret
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Minimum disclosure proofs of knowledge
- Zero-knowledge proofs of identity
- Definitions and properties of zero-knowledge proof systems
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
- Publicly Verifiable Secret Sharing
- Robust Threshold DSS Signatures
- How to share a secret
- Resettable zero-knowledge (extended abstract)
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- The Knowledge Complexity of Interactive Proof Systems
- On Signatures of Knowledge
This page was built for publication: Leakproof secret sharing protocols with applications to group identification scheme