A verifiable multi-secret sharing scheme based on cellular automata
DOI10.1016/J.INS.2010.04.015zbMATH Open1193.94070OpenAlexW2094237742MaRDI QIDQ991230FDOQ991230
Authors: J. Martínez
Publication date: 2 September 2010
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.04.015
Recommendations
- A secret sharing scheme based on cellular automata
- A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA
- An algorithm to share secrets based on memory cellular automata
- SHARING SECRETS USING ELEMENTARY CELLULAR AUTOMATA
- A new verifiable \((t,n)\) multi-secret-sharing scheme
- A verifiable threshold multi-secret sharing scheme
- A multisecret sharing scheme for color images based on cellular automata
- New efficient and practical verifiable multi-secret sharing schemes
- A verifiable multi-secret-sharing scheme based on homogeneous linear recursion
cellular automatadiscrete logarithm problemcryptographic protocolsecret sharing schemesecret image sharing
Cellular automata (computational aspects) (68Q80) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- How to share a secret
- New efficient and practical verifiable multi-secret sharing schemes
- Invertible cellular automata: A review
- A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
- Secret image sharing based on cellular automata and steganography
- A multisecret sharing scheme for color images based on cellular automata
- A secret sharing scheme based on cellular automata
- Reversible cellular automata with memory: two-dimensional patterns from a single site seed
Cited In (15)
- Robust consensus tracking control for switched multiple Lagrangian systems by UDE-based control method
- A secret sharing scheme based on cellular automata
- Verifiable multi-secret sharing based on LFSR sequences
- An ideal multi-secret sharing scheme based on MSP
- Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem
- A new secret sharing scheme adversary fuzzy structure based on automata
- Inversion of Mutually Orthogonal Cellular Automata
- A non-interactive \((t, n)\)-publicly verifiable multi-secret sharing scheme
- A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction
- A verifiable threshold secret sharing scheme based on lattices
- Image encryption scheme based on balanced two-dimensional cellular automata
- A search for good pseudo-random number generators: survey and empirical studies
- An algorithm to share secrets based on memory cellular automata
- A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA
- Efficient verifiable multi-secret sharing scheme based on hash function
This page was built for publication: A verifiable multi-secret sharing scheme based on cellular automata
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q991230)