A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure (original) (raw)
Related papers
Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program
IET Information Security, 2017
Lecture Notes in Computer Science, 1994
An efficient multi-use multi-secret sharing scheme
Proceedings of National Workshop on Cryptology, 2009, SVNIT Surat, 2009
On secret sharing schemes with extended capabilities
2002
A Multiple Secret Sharing Scheme based on Matrix Projection
2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009
New secret sharing scheme for multipartite access structures with threshold changeability
2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015
A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing
Secret sharing scheme realizing general access structure
Electronics and Communications in Japan (Part III: Fundamental Electronic Science)
A New Approach to Weighted Multi-Secret Sharing
2011
On construction of cumulative secret sharing schemes
Lecture Notes in Computer Science, 1998
Multi-stage Multi-secret Sharing Scheme for Hierarchical Access Structure
An ideal multi-secret sharing scheme based on minimal privileged coalitions
On the optimization of bipartite secret sharing schemes
Designs, Codes and Cryptography, 2011
Consideration for multi-threshold multi-secret sharing schemes
International Symposium on Information Theory and Applications (ISITA 2012)
An Explication of Secret Sharing Schemes with General Access Structure
2013
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
Advances in Cryptology — EUROCRYPT 2000, 2000
Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops, 2006
IJERT-Analyzing Proactive Secret Sharing Schemes
International Journal of Engineering Research and Technology (IJERT), 2014
Mutually Trusted Authority-Free Secret Sharing Schemes
Journal of Cryptology, 1997
An efficient multi-use multi-secret sharing scheme based on hash function
Applied mathematics letters, 2010
Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)
Eurocrypt, 1995
Ideal Secret Sharing Schemes with Share Selectability
Lecture Notes in Computer Science, 2011
Fully dynamic secret sharing schemes
Theoretical Computer Science, 1996
Compounding secret sharing schemes
Anonymous secret sharing schemes
Discrete Applied Mathematics, 1997
Linear complementary dual code-based Multi-secret sharing scheme
arXiv (Cornell University), 2021
Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT
Journal of Communications Software and Systems, 2015
Secret sharing schemes with partial broadcast channels
Designs, Codes and Cryptography, 2006
Nearly optimal robust secret sharing
2016 IEEE International Symposium on Information Theory (ISIT), 2016
Secret Sharing and Secure Computing from Monotone Formulae
Two Optimum Secret Sharing Schemes Revisited
2008 International Seminar on Future Information Technology and Management Engineering, 2008
On Distributed Multi-User Secret Sharing with Multiple Secrets per User
arXiv (Cornell University), 2023