Sequential (t,n) multi secret sharing scheme for level-ordered access structure (original) (raw)
Related papers
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure
Int. J. Netw. Secur., 2016
Multi-stage Multi-secret Sharing Scheme for Hierarchical Access Structure
Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem
IET Information Security, 2021
New secret sharing scheme for multipartite access structures with threshold changeability
2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015
Secret sharing scheme realizing general access structure
Electronics and Communications in Japan (Part III: Fundamental Electronic Science)
An Explication of Secret Sharing Schemes with General Access Structure
2013
An ideal hierarchical secret sharing scheme
ArXiv, 2020
IACR Cryptology ePrint Archive, 2018
Cryptosystem for Secret Sharing Scheme with Hierarchical Groups
An efficient multi-use multi-secret sharing scheme
Proceedings of National Workshop on Cryptology, 2009, SVNIT Surat, 2009
Lecture Notes in Computer Science, 1994
A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing
Multilevel Threshold Secret Image Sharing based on the Chinese Remainder Theorem
2016
Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT
Journal of Communications Software and Systems, 2015
Consideration for multi-threshold multi-secret sharing schemes
International Symposium on Information Theory and Applications (ISITA 2012)
An efficient multi-use multi-secret sharing scheme based on hash function
Applied mathematics letters, 2010
CRT based multi-secret sharing schemes: revisited
International Journal of Security and Networks, 2018
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension
Sakibur Rahman, Shinsaku Kiyomoto
An improved secret sharing scheme based on ( K,N ) threshold
International Journal Foundation
Advance Research Journal of Multidisciplinary Discoveries, 2019
Weighted threshold secret sharing based on the Chinese remainder theorem
2005
IJERT-General Access Structure For Modulo-2 Secret Sharing Scheme
International Journal of Engineering Research and Technology (IJERT), 2012
A New Approach to Weighted Multi-Secret Sharing
2011
Ciência e Natura, 2015
On construction of cumulative secret sharing schemes
Lecture Notes in Computer Science, 1998
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem
The ISC International Journal of Information Security, 2023
A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure
Wireless Personal Communications, 2018
A Multiple Secret Sharing Scheme based on Matrix Projection
2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Multisecret-sharing scheme with two-level security and its applications in Blockchain
Cornell University - arXiv, 2022
International Journal of Advance Engineering and Research Development, 2016
Study on the Parameters of Secret Sharing Scheme
General Access Structure For Modulo-2 Secret Sharing Scheme
2012
A multi-stage secret sharing scheme using all-or-nothing transform approach
2009
An efficient (n, n) -threshold secret sharing Scheme using on FAPKC4 and hash function
Journal of Computer Science IJCSIS
Two level secret sharing schemes based on magic labelings
2005