scientific article; zbMATH DE number 4195886
From MaRDI portal
Publication:5202624
zbMath0724.94011MaRDI QIDQ5202624
Publication date: 1990
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (27)
Discrete modulation continuous variable quantum secret sharing ⋮ ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls ⋮ Secret Sharing for mNP: Completeness Results ⋮ Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems ⋮ Algebraic geometric secret sharing schemes over large fields are asymptotically threshold ⋮ Cryptographic algorithms for privacy-preserving online applications ⋮ Dynamic hierarchical quantum secret sharing with general access structure ⋮ Dynamic and Verifiable Hierarchical Secret Sharing ⋮ Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness ⋮ Homomorphic extensions of CRT-based secret sharing ⋮ Rational quantum secret sharing scheme based on GHZ state ⋮ Constructing ideal secret sharing schemes based on Chinese remainder theorem ⋮ An ID-based signcryption scheme with compartmented secret sharing for unsigncryption ⋮ Incidence structures applied to cryptography ⋮ Finding the maximal adversary structure from any given access structure ⋮ Admissible tracks in Lai-Ding's secret sharing scheme ⋮ Optimal assignment schemes for general access structures based on linear programming ⋮ How to share a secret ⋮ Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem ⋮ Схема разделения секрета типа схемы Блэкли, основанная на пересечении подпространств ⋮ A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme ⋮ Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system ⋮ Secret-sharing with a class of ternary codes ⋮ General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting ⋮ A Key Sharing Scheme over GF(25) to Use in ECC ⋮ Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer ⋮ Practical (fully) distributed signatures provably secure in the standard model
This page was built for publication: