Recursive hiding of biometrics-based secret sharing scheme using adversary structure
From MaRDI portal
Publication:456087
Recommendations
- A new secret sharing scheme adversary fuzzy structure based on automata
- A verifiable multi-secret-sharing scheme based on homogeneous linear recursion
- scientific article; zbMATH DE number 6671957
- Three \((t, n )\)-secret image sharing schemes based on homogeneous linear recursion
- A verifiable secret image sharing scheme based on compressive sensing
Cites work
- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
- An efficient multi-use multi-secret sharing scheme based on hash function
- An ideal multi-secret sharing scheme based on MSP
- Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
- Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
- How to share a secret
- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
- Player simulation and general adversary structures in perfect multiparty computation
- Recursive constructions for perfect secret sharing schemes
- Secret-sharing with a class of ternary codes
This page was built for publication: Recursive hiding of biometrics-based secret sharing scheme using adversary structure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q456087)