Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication
From MaRDI portal
Publication:5253627
DOI10.1007/978-3-319-09843-2_6zbMath1394.94947OpenAlexW2122947370MaRDI QIDQ5253627
Kirill Morozov, Rui Xu, Tsuyoshi Takagi
Publication date: 27 May 2015
Published in: Advances in Information and Computer Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-09843-2_6
Shamir secret sharingcheater identifiable secret sharingrushing adversarymulti-receiver authentication code
Related Items (6)
Ramp secret sharing with cheater identification in presence of rushing cheaters ⋮ Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters ⋮ Revisiting group oriented secret sharing schemes ⋮ Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness ⋮ A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme ⋮ Quantum verifiable protocol for secure modulo zero-sum randomness
This page was built for publication: Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication