Hierarchical threshold secret sharing
From MaRDI portal
Publication:877809
DOI10.1007/S00145-006-0334-8zbMATH Open1113.68048OpenAlexW2083952939MaRDI QIDQ877809FDOQ877809
Publication date: 3 May 2007
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-006-0334-8
Interpolation in approximation theory (41A05) Authentication, digital signatures and secret sharing (94A62)
Cited In (44)
- Ideal Secret Sharing Schemes for Useful Multipartite Access Structures
- On the enumeration of Boolean functions with distinguished variables
- Ideal secret sharing schemes on graph-based $3$-homogeneous access structures
- Title not available (Why is that?)
- Efficient integer span program for hierarchical threshold access structure
- Three-level secret sharing schemes from the twisted cubic
- Extensions of access structures and their cryptographic applications
- Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
- On the characterization of weighted simple games
- Ideal multipartite secret sharing schemes
- Practical (fully) distributed signatures provably secure in the standard model
- Generalized oblivious transfer by secret sharing
- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation
- Multipartite secret sharing by bivariate interpolation
- Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
- Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps
- Ideal uniform multipartite secret sharing schemes
- Efficient explicit constructions of compartmented secret sharing schemes
- A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations
- A verifiable threshold secret sharing scheme based on lattices
- The \(\varepsilon\)-\(t\)-net problem
- On the optimization of bipartite secret sharing schemes
- Fair hierarchical secret sharing scheme based on smart contract
- Access structures determined by uniform polymatroids
- Distributive weighted threshold secret sharing schemes
- Short Attribute-Based Signatures for Threshold Predicates
- An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry
- How to share a secret
- Multilevel secret sharing schemes arising from the normal rational curve
- New generalized secret-sharing schemes with points on a hyperplane using a Wronskian matrix
- Growth of dimension in complete simple games
- Cheating-Tolerant and Threshold-Based Secure Information Exchange Among Propinquity of Adversaries
- Enumeration of weighted games with minimum and an analysis of voting power for bipartite complete games with minimum
- Operations over Linear Secret Sharing Schemes
- Secret Sharing Schemes for (k, n)-Consecutive Access Structures
- A remark on hierarchical threshold secret sharing
- Conjunctive hierarchical multi-secret sharing scheme using elliptic curves
- Roughly weighted hierarchical simple games
- Ideal hierarchical secret sharing and lattice path matroids
- Dynamic and Verifiable Hierarchical Secret Sharing
- Secret sharing schemes for compartmented access structures
- A perfect secret sharing scheme for general access structures
- An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem
- Ideal Hierarchical Secret Sharing Schemes
Recommendations
- Theory of Cryptography π π
- A remark on hierarchical threshold secret sharing π π
- Strongly Multiplicative Hierarchical Threshold Secret Sharing π π
- Secure multi-level threshold multi-secret sharing π π
- Secret sharing in hierarchical groups π π
- Ideal Hierarchical Secret Sharing Schemes π π
- Ideal Hierarchical Secret Sharing Schemes π π
- A scheme for threshold multi-secret sharing π π
- Dynamic and Verifiable Hierarchical Secret Sharing π π
- A new threshold secret sharing scheme π π
This page was built for publication: Hierarchical threshold secret sharing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q877809)