Cheating-tolerant and threshold-based secure information exchange among propinquity of adversaries
From MaRDI portal
Publication:5050226
DOI10.1007/978-981-16-1295-4_11zbMATH Open1504.94076OpenAlexW3177168110MaRDI QIDQ5050226FDOQ5050226
Authors: Anindya Biswas, Mou Dasgupta
Publication date: 15 November 2022
Published in: Algorithms for Intelligent Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-981-16-1295-4_11
Recommendations
- The Detection of Cheaters in Thershold Schemes
- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n − 1 Cheaters
- Properties and constraints of cheating-immune secret sharing schemes
- Optimum Secret Sharing Scheme Secure against Cheating
- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
cheating detectionLagrange polynomial interpolationcryptographic hash functionKGCcheating identificationsecret-key management
Cites Work
- How to share a secret
- New directions in cryptography
- Identity-Based Encryption from the Weil Pairing
- How to share a secret with cheaters
- Hierarchical threshold secret sharing
- Detection and identification of cheaters in \((t,n)\) secret sharing scheme
- Certificateless identity-concealed authenticated encryption under multi-KGC
This page was built for publication: Cheating-tolerant and threshold-based secure information exchange among propinquity of adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5050226)