An ideal multi-secret sharing scheme based on MSP
From MaRDI portal
Publication:543828
DOI10.1016/j.ins.2010.11.032zbMath1251.94041OpenAlexW1999032993MaRDI QIDQ543828
Bing Zeng, Xueming Tang, Ching-Fang Hsu, Qi Cheng
Publication date: 17 June 2011
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.11.032
Related Items (11)
Memory leakage-resilient secret sharing schemes ⋮ A novel group key transfer for big data security ⋮ Authenticable quantum multi-secret sharing scheme based on monotone span program ⋮ Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities ⋮ Ideal access structures based on a class of minimal linear codes ⋮ Recursive hiding of biometrics-based secret sharing scheme using adversary structure ⋮ A verifiable threshold secret sharing scheme based on lattices ⋮ General secret sharing based on quantum Fourier transform ⋮ New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures ⋮ Realizing secret sharing with general access structure ⋮ An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry
Cites Work
- A construction for multisecret threshold schemes
- Certificateless threshold ring signature
- Linear multi-secret sharing schemes
- Visual secret sharing for multiple secrets
- A multisecret sharing scheme for color images based on cellular automata
- A verifiable multi-secret sharing scheme based on cellular automata
- Strong \((n, t, n)\) verifiable secret sharing scheme
- Linear multi-secret sharing schemes based on multi-party computation
- An explication of secret sharing schemes
- Multiple assignment scheme for sharing secret
- On the size of shares for secret sharing schemes
- The size of a share must be large
- New efficient and practical verifiable multi-secret sharing schemes
- A scheme for threshold multi-secret sharing
- Ideal secret sharing schemes with multiple secrets
- A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
- A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
- How to share a secret
- Multiple ramp schemes
- On secret sharing systems
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: An ideal multi-secret sharing scheme based on MSP