A modular approach to key safeguarding
From MaRDI portal
Publication:5120697
DOI10.1109/TIT.1983.1056651zbMATH Open1447.94018WikidataQ27915587 ScholiaQ27915587MaRDI QIDQ5120697FDOQ5120697
Authors: C. Asmuth, John R. Bloom
Publication date: 15 September 2020
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Recommendations
Cited In (50)
- Efficient privacy-preserving outsourced \(k\)-means clustering on distributed data
- A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security
- Verifiable threshold quantum secret sharing with sequential communication
- A rational threshold signature model and protocol based on different permissions
- Finding the maximal adversary structure from any given access structure
- A dynamic secret sharing scheme with cheater detection
- Quantum advantage of threshold changeable secret sharing scheme
- Non-admissible tracks in Shamirs scheme
- Continuous variable quantum secret sharing with Chinese remainder theorem
- Threshold quantum secret sharing based on single qubit
- A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing
- Chinese remainder theorem-based secret image sharing with small-sized shadow images
- Sharing DSS by the Chinese remainder theorem
- Elementary symmetric polynomials in Shamir's scheme
- ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes
- Homomorphic extensions of CRT-based secret sharing
- Robust Threshold Schemes Based on the Chinese Remainder Theorem
- Cryptography with weights: MPC, encryption and signatures
- On ASGS framework: general requirements and an example of implementation
- Realizing secret sharing with general access structure
- Randomized component based secure secret reconstruction in insecure networks
- Threshold cryptography based on Asmuth-Bloom secret sharing
- Optimal codes from Fibonacci polynomials and secret sharing schemes
- Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
- Multilevel threshold secret sharing based on the Chinese remainder theorem
- A collaborative secret sharing scheme based on the Chinese remainder theorem
- Ramp secret image sharing
- On the asymptotic idealness of the Asmuth-Bloom threshold secret sharing scheme
- Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem
- Constructing ideal secret sharing schemes based on Chinese remainder theorem
- Distributive weighted threshold secret sharing schemes
- Generalized Mignotte's sequences over polynomial rings
- An asymptotically perfect secret sharing scheme based on the Chinese remainder theorem
- Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes
- Scalable multiparty computation from non-linear secret sharing
- Traceable secret sharing: strong security and efficient constructions
- On the design of a key-lock-pair mechanism in information protection systems
- A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme
- A new secret sharing scheme
- Ramp scheme based on CRT for polynomial ring over finite field
- General secret sharing based on the Chinese remainder theorem with applications in e-voting
- A secure and efficient on-line/off-line group key distribution protocol
- A lossless linear algebraic secret image sharing scheme
- A perfect secret sharing scheme for general access structures
- Revisiting group oriented secret sharing schemes
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem
- Standard \((k, n)\)-threshold hierarchical quantum secret sharing
- Dynamic threshold secret reconstruction and its application to the threshold cryptography
- Threshold changeable secret sharing with secure secret reconstruction
This page was built for publication: A modular approach to key safeguarding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5120697)