Sequential (t,n) multi secret sharing scheme for level-ordered access structure (original) (raw)

Sequential Secret Sharing Scheme Based on Level Ordered Access Structure

Appala Tentu

Int. J. Netw. Secur., 2016

View PDFchevron_right

Multi-stage Multi-secret Sharing Scheme for Hierarchical Access Structure

Abdul Basit

View PDFchevron_right

Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem

Abdul Basit

View PDFchevron_right

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

Ferucio Laurentiu Tiplea

IET Information Security, 2021

View PDFchevron_right

New secret sharing scheme for multipartite access structures with threshold changeability

Appala Tentu

2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015

View PDFchevron_right

Secret sharing scheme realizing general access structure

Takao Nishizeki

Electronics and Communications in Japan (Part III: Fundamental Electronic Science)

View PDFchevron_right

An Explication of Secret Sharing Schemes with General Access Structure

Kapil Tajane

2013

View PDFchevron_right

An ideal hierarchical secret sharing scheme

BOUROUBI sadek

ArXiv, 2020

View PDFchevron_right

Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures

Ferucio Laurentiu Tiplea

IACR Cryptology ePrint Archive, 2018

View PDFchevron_right

Cryptosystem for Secret Sharing Scheme with Hierarchical Groups

Atanu Basu

View PDFchevron_right

An efficient multi-use multi-secret sharing scheme

Angsuman Das

Proceedings of National Workshop on Cryptology, 2009, SVNIT Surat, 2009

View PDFchevron_right

Multi-Secret Sharing Schemes

Giovanni Di Crescenzo

Lecture Notes in Computer Science, 1994

View PDFchevron_right

A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing

Gwoboa Horng

View PDFchevron_right

Multilevel Threshold Secret Image Sharing based on the Chinese Remainder Theorem

Rosemary Koikara

2016

View PDFchevron_right

Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT

Anjaneyulu Endurthi

Journal of Communications Software and Systems, 2015

View PDFchevron_right

Consideration for multi-threshold multi-secret sharing schemes

Masakazu Soshi

International Symposium on Information Theory and Applications (ISITA 2012)

View PDFchevron_right

An efficient multi-use multi-secret sharing scheme based on hash function

Angsuman Das

Applied mathematics letters, 2010

View PDFchevron_right

CRT based multi-secret sharing schemes: revisited

Appala Tentu

International Journal of Security and Networks, 2018

View PDFchevron_right

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension

Sakibur Rahman, Shinsaku Kiyomoto

View PDFchevron_right

An improved secret sharing scheme based on ( K,N ) threshold

International Journal Foundation

Advance Research Journal of Multidisciplinary Discoveries, 2019

View PDFchevron_right

Weighted threshold secret sharing based on the Chinese remainder theorem

Ioana Boureanu

2005

View PDFchevron_right

IJERT-General Access Structure For Modulo-2 Secret Sharing Scheme

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2012

View PDFchevron_right

A New Approach to Weighted Multi-Secret Sharing

Elisa Bertino

2011

View PDFchevron_right

A New Secret Sharing Scheme With Priority in Order of Sharing and its Application in Multi Authority E-voting Systems

Foroogh Mousavi

Ciência e Natura, 2015

View PDFchevron_right

On construction of cumulative secret sharing schemes

Huaxiong Wang

Lecture Notes in Computer Science, 1998

View PDFchevron_right

A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem

ISECURE Journal

The ISC International Journal of Information Security, 2023

View PDFchevron_right

A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure

Massoud Hadian Dehkordi

Wireless Personal Communications, 2018

View PDFchevron_right

A Multiple Secret Sharing Scheme based on Matrix Projection

Xukai Zou

2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009

View PDFchevron_right

Multisecret-sharing scheme with two-level security and its applications in Blockchain

Ritumoni Sarma

Cornell University - arXiv, 2022

View PDFchevron_right

A Survey: Secret Sharing

Ankit Chouhan

International Journal of Advance Engineering and Research Development, 2016

View PDFchevron_right

Study on the Parameters of Secret Sharing Scheme

Sougata Chakraborty

View PDFchevron_right

General Access Structure For Modulo-2 Secret Sharing Scheme

Kapil Tajane

2012

View PDFchevron_right

A multi-stage secret sharing scheme using all-or-nothing transform approach

Taraneh Eghlidos

2009

View PDFchevron_right

An efficient (n, n) -threshold secret sharing Scheme using on FAPKC4’ and hash function

Journal of Computer Science IJCSIS

View PDFchevron_right

Two level secret sharing schemes based on magic labelings

Rinovia Simanjuntak

2005

View PDFchevron_right