Weighted threshold secret sharing schemes
From MaRDI portal
Recommendations
Cited in
(23)- Threshold schemes with weights
- A rational threshold signature model and protocol based on different permissions
- Theory of Cryptography
- Ideal multipartite secret sharing schemes
- ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls
- Practical (fully) distributed signatures provably secure in the standard model
- A weighted secret sharing based on reputation mechanism
- Cryptography with weights: MPC, encryption and signatures
- Realizing secret sharing with general access structure
- A characterisation of ideal weighted secret sharing schemes
- scientific article; zbMATH DE number 5263446 (Why is no real title available?)
- Lower bounds on the information rate of secret sharing schemes with homogeneous access structure.
- Constructing ideal secret sharing schemes based on Chinese remainder theorem
- Distributive weighted threshold secret sharing schemes
- Ideal hierarchical secret sharing schemes
- Weighted secret sharing from wiretap channels
- How to share a secret
- New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures
- Ideal secret sharing schemes for useful multipartite access structures
- Dynamic and verifiable secret sharing among weighted participants
- Monotone circuits for monotone weighted threshold functions
- Any 2-asummable bipartite function is weighted threshold
- Characterizing Ideal Weighted Threshold Secret Sharing
This page was built for publication: Weighted threshold secret sharing schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1606940)