A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure (original) (raw)

Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program

Massoud Hadian Dehkordi

IET Information Security, 2017

View PDFchevron_right

Multi-Secret Sharing Schemes

Giovanni Di Crescenzo

Lecture Notes in Computer Science, 1994

View PDFchevron_right

An efficient multi-use multi-secret sharing scheme

Angsuman Das

Proceedings of National Workshop on Cryptology, 2009, SVNIT Surat, 2009

View PDFchevron_right

On secret sharing schemes with extended capabilities

Zbigniew Kotulski

2002

View PDFchevron_right

A Multiple Secret Sharing Scheme based on Matrix Projection

Xukai Zou

2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009

View PDFchevron_right

New secret sharing scheme for multipartite access structures with threshold changeability

Appala Tentu

2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015

View PDFchevron_right

A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing

Gwoboa Horng

View PDFchevron_right

Secret sharing scheme realizing general access structure

Takao Nishizeki

Electronics and Communications in Japan (Part III: Fundamental Electronic Science)

View PDFchevron_right

A New Approach to Weighted Multi-Secret Sharing

Elisa Bertino

2011

View PDFchevron_right

On construction of cumulative secret sharing schemes

Huaxiong Wang

Lecture Notes in Computer Science, 1998

View PDFchevron_right

Multi-stage Multi-secret Sharing Scheme for Hierarchical Access Structure

Abdul Basit

View PDFchevron_right

An ideal multi-secret sharing scheme based on minimal privileged coalitions

apurva thakur

View PDFchevron_right

On the optimization of bipartite secret sharing schemes

Leonor Vazquez

Designs, Codes and Cryptography, 2011

View PDFchevron_right

Consideration for multi-threshold multi-secret sharing schemes

Masakazu Soshi

International Symposium on Information Theory and Applications (ISITA 2012)

View PDFchevron_right

An Explication of Secret Sharing Schemes with General Access Structure

Kapil Tajane

2013

View PDFchevron_right

General Secure Multi-party Computation from any Linear Secret-Sharing Scheme

Ivan Damgård

Advances in Cryptology — EUROCRYPT 2000, 2000

View PDFchevron_right

Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio

Justie Juan

IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops, 2006

View PDFchevron_right

IJERT-Analyzing Proactive Secret Sharing Schemes

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2014

View PDFchevron_right

Mutually Trusted Authority-Free Secret Sharing Schemes

Keith Martin

Journal of Cryptology, 1997

View PDFchevron_right

An efficient multi-use multi-secret sharing scheme based on hash function

Angsuman Das

Applied mathematics letters, 2010

View PDFchevron_right

Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)

Keith Martin

Eurocrypt, 1995

View PDFchevron_right

Ideal Secret Sharing Schemes with Share Selectability

Masakazu Soshi

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Fully dynamic secret sharing schemes

Carlo Blundo

Theoretical Computer Science, 1996

View PDFchevron_right

Compounding secret sharing schemes

Edgar Martinez-Moro

View PDFchevron_right

Anonymous secret sharing schemes

Carlo Blundo

Discrete Applied Mathematics, 1997

View PDFchevron_right

Linear complementary dual code-based Multi-secret sharing scheme

Satya Bagchi

arXiv (Cornell University), 2021

View PDFchevron_right

Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT

Anjaneyulu Endurthi

Journal of Communications Software and Systems, 2015

View PDFchevron_right

Secret sharing schemes with partial broadcast channels

Huaxiong Wang

Designs, Codes and Cryptography, 2006

View PDFchevron_right

Nearly optimal robust secret sharing

Mahdi Cheraghchi

2016 IEEE International Symposium on Information Theory (ISIT), 2016

View PDFchevron_right

Secret Sharing and Secure Computing from Monotone Formulae

Peter Bro Miltersen

View PDFchevron_right

Two Optimum Secret Sharing Schemes Revisited

Olivier Markowitch

2008 International Seminar on Future Information Technology and Management Engineering, 2008

View PDFchevron_right

On Distributed Multi-User Secret Sharing with Multiple Secrets per User

Harshithanjani Athi

arXiv (Cornell University), 2023

View PDFchevron_right