Cheating-tolerant and threshold-based secure information exchange among propinquity of adversaries
From MaRDI portal
Publication:5050226
Recommendations
- The Detection of Cheaters in Thershold Schemes
- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n − 1 Cheaters
- Properties and constraints of cheating-immune secret sharing schemes
- Optimum Secret Sharing Scheme Secure against Cheating
- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
Cites work
- Certificateless identity-concealed authenticated encryption under multi-KGC
- Detection and identification of cheaters in \((t,n)\) secret sharing scheme
- Hierarchical threshold secret sharing
- How to share a secret
- How to share a secret with cheaters
- Identity-Based Encryption from the Weil Pairing
- New directions in cryptography
This page was built for publication: Cheating-tolerant and threshold-based secure information exchange among propinquity of adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5050226)