Recursive hiding of biometrics-based secret sharing scheme using adversary structure
From MaRDI portal
Publication:456087
DOI10.1016/J.IPL.2012.06.006zbMATH Open1250.94057OpenAlexW2071914424WikidataQ57631874 ScholiaQ57631874MaRDI QIDQ456087FDOQ456087
Authors: Hong Lai, Jinghua Xiao, Lixiang Li, Yi-Xian Yang
Publication date: 23 October 2012
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2012.06.006
Recommendations
- A new secret sharing scheme adversary fuzzy structure based on automata
- A verifiable multi-secret-sharing scheme based on homogeneous linear recursion
- scientific article
- Three \((t, n )\)-secret image sharing schemes based on homogeneous linear recursion
- A verifiable secret image sharing scheme based on compressive sensing
Cites Work
- How to share a secret
- Player simulation and general adversary structures in perfect multiparty computation
- An ideal multi-secret sharing scheme based on MSP
- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
- Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
- Secret-sharing with a class of ternary codes
- Recursive constructions for perfect secret sharing schemes
- Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
- An efficient multi-use multi-secret sharing scheme based on hash function
Cited In (1)
This page was built for publication: Recursive hiding of biometrics-based secret sharing scheme using adversary structure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q456087)