Pages that link to "Item:Q5120697"
From MaRDI portal
The following pages link to A modular approach to key safeguarding (Q5120697):
Displaying 39 items.
- Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes (Q497226) (← links)
- A new secret sharing scheme (Q509279) (← links)
- Non-admissible tracks in Shamirs scheme (Q549265) (← links)
- Elementary symmetric polynomials in Shamir's scheme (Q984842) (← links)
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes (Q998654) (← links)
- ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls (Q1633460) (← links)
- Distributive weighted threshold secret sharing schemes (Q1671693) (← links)
- Optimal codes from Fibonacci polynomials and secret sharing schemes (Q1690548) (← links)
- Constructing ideal secret sharing schemes based on Chinese remainder theorem (Q1710679) (← links)
- Threshold quantum secret sharing based on single qubit (Q1746907) (← links)
- Verifiable threshold quantum secret sharing with sequential communication (Q1994772) (← links)
- Finding the maximal adversary structure from any given access structure (Q1999100) (← links)
- Randomized component based secure secret reconstruction in insecure networks (Q2154040) (← links)
- A collaborative secret sharing scheme based on the Chinese remainder theorem (Q2160650) (← links)
- Ramp secret image sharing (Q2160785) (← links)
- Homomorphic extensions of CRT-based secret sharing (Q2197441) (← links)
- On the asymptotic idealness of the Asmuth-Bloom threshold secret sharing scheme (Q2198255) (← links)
- A new threshold changeable secret sharing scheme based on the Chinese remainder theorem (Q2200703) (← links)
- Tightly coupled multi-group threshold secret sharing based on Chinese remainder theorem (Q2274088) (← links)
- Continuous variable quantum secret sharing with Chinese remainder theorem (Q2280622) (← links)
- Realizing secret sharing with general access structure (Q2282021) (← links)
- Threshold changeable secret sharing with secure secret reconstruction (Q2296281) (← links)
- Chinese remainder theorem-based secret image sharing with small-sized shadow images (Q2333658) (← links)
- A rational threshold signature model and protocol based on different permissions (Q2336193) (← links)
- Sharing DSS by the Chinese remainder theorem (Q2349622) (← links)
- Dynamic threshold secret reconstruction and its application to the threshold cryptography (Q2353654) (← links)
- Threshold cryptography based on Asmuth-Bloom secret sharing (Q2384533) (← links)
- A secure and efficient on-line/off-line group key distribution protocol (Q2420472) (← links)
- A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme (Q2446574) (← links)
- Multilevel threshold secret sharing based on the Chinese remainder theorem (Q2448863) (← links)
- On ASGS framework: general requirements and an example of implementation (Q2644567) (← links)
- A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security (Q2677568) (← links)
- Ramp scheme based on CRT for polynomial ring over finite field (Q2699255) (← links)
- Generalized Mignotte's Sequences Over Polynomial Rings (Q2866726) (← links)
- General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting (Q2866729) (← links)
- An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem (Q3174872) (← links)
- A perfect secret sharing scheme for general access structures (Q6118655) (← links)
- Revisiting group oriented secret sharing schemes (Q6125457) (← links)
- Bivariate polynomial-based secret sharing schemes with secure secret reconstruction (Q6190047) (← links)