Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem
From MaRDI portal
Publication:526653
DOI10.1016/J.INS.2014.08.046zbMATH Open1360.94323OpenAlexW2042098128MaRDI QIDQ526653FDOQ526653
Massoud Hadian Dehkordi, S. Mashhadi
Publication date: 15 May 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.08.046
verifiable secret sharingLFSR public-key cryptosystemnonhomogeneous linear recursionpublic valuesecure channel
Cites Work
- How to share a secret
- Public-key cryptosystems based on cubic finite field extensions
- A \((t,n)\) multi-secret sharing scheme
- New efficient and practical verifiable multi-secret sharing schemes
- A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
- A multiple-level visual secret-sharing scheme without image size expansion
- A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
- Verifiable multi-secret sharing based on LFSR sequences
- Title not available (Why is that?)
- A verifiable multi-secret sharing scheme based on cellular automata
- Title not available (Why is that?)
- Strong \((n, t, n)\) verifiable secret sharing scheme
Cited In (11)
- New \((k,l,m)\)-verifiable multi-secret sharing schemes based on XTR public key system
- Verifiable multi-secret sharing based on LFSR sequences
- Realizing secret sharing with general access structure
- A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations
- A non-interactive \((t, n)\)-publicly verifiable multi-secret sharing scheme
- Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem
- A verifiable threshold secret sharing scheme based on lattices
- New multi-stage secret sharing in the standard model
- A fully dynamic multi-secret sharing scheme with redundant authorization
- A fully dynamic secret sharing scheme
- An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem
This page was built for publication: Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q526653)