Leakproof secret sharing protocols with applications to group identification scheme
From MaRDI portal
(Redirected from Publication:439799)
Recommendations
- A group identification protocol with leakage resilience of secret sharing scheme
- Gruppen secret sharing or how to share several secrets if you must?
- scientific article; zbMATH DE number 826068
- On identification secret sharing schemes.
- A \((t, n)\) threshold secret sharing system with efficient identification of cheaters
Cites work
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 1304087 (Why is no real title available?)
- scientific article; zbMATH DE number 708820 (Why is no real title available?)
- scientific article; zbMATH DE number 1759795 (Why is no real title available?)
- scientific article; zbMATH DE number 1775426 (Why is no real title available?)
- scientific article; zbMATH DE number 1406779 (Why is no real title available?)
- scientific article; zbMATH DE number 1418290 (Why is no real title available?)
- scientific article; zbMATH DE number 1418293 (Why is no real title available?)
- A publicly verifiable secret sharing scheme with information-theoretic security
- Definitions and properties of zero-knowledge proof systems
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- How to share a secret
- Minimum disclosure proofs of knowledge
- On Signatures of Knowledge
- Practical threshold signatures
- Publicly verifiable secret sharing
- Resettable zero-knowledge (extended abstract)
- Robust threshold DSS signatures
- The Knowledge Complexity of Interactive Proof Systems
- Zero-knowledge proofs of identity
Cited in
(6)- Threshold Anonymous Group Identification and Zero-Knowledge Proof
- The optimal linear secret sharing scheme for any given access structure
- A group identification protocol with leakage resilience of secret sharing scheme
- How to share a secret
- Memory leakage-resilient secret sharing schemes
- Dynamic threshold based information leaker identification scheme
This page was built for publication: Leakproof secret sharing protocols with applications to group identification scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q439799)