1

Detection and identification of cheaters in (t,n) secret sharing scheme

Year:
2009
Language:
english
File:
PDF, 195 KB
english, 2009
2

Generalised cheater detection and identification

Year:
2014
Language:
english
File:
PDF, 594 KB
english, 2014
3

Multilevel threshold secret sharing based on the Chinese Remainder Theorem

Year:
2014
Language:
english
File:
PDF, 220 KB
english, 2014
5

Strong (n, t, n) verifiable secret sharing scheme

Year:
2010
Language:
english
File:
PDF, 168 KB
english, 2010
6

Public-key cryptosystems based on cubic finite field extensions

Year:
1999
Language:
english
File:
PDF, 165 KB
english, 1999
7

Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks

Year:
2015
Language:
english
File:
PDF, 566 KB
english, 2015
10

Secret sharing with secure secret reconstruction

Year:
2020
Language:
english
File:
PDF, 393 KB
english, 2020
12

An efficient probabilistic encryption scheme

Year:
1990
Language:
english
File:
PDF, 580 KB
english, 1990
13

A software authentication system for information integrity

Year:
1992
Language:
english
File:
PDF, 539 KB
english, 1992
14

Improved DSA variant for batch verification

Year:
2005
Language:
english
File:
PDF, 111 KB
english, 2005
15

Contract signature in e-commerce

Year:
2011
Language:
english
File:
PDF, 177 KB
english, 2011
16

Efficient identity-based RSA multisignatures

Year:
2008
Language:
english
File:
PDF, 163 KB
english, 2008
17

Design of DL-based certificateless digital signatures

Year:
2009
Language:
english
File:
PDF, 207 KB
english, 2009
18

Efficient identity-based GQ multisignatures

Year:
2009
Language:
english
File:
PDF, 251 KB
english, 2009
19

Fair reconstruction of a secret

Year:
1995
Language:
english
File:
PDF, 238 KB
english, 1995
20

A cryptographic key generation scheme for multilevel data security

Year:
1990
Language:
english
File:
PDF, 690 KB
english, 1990
21

Efficient (n, t, n) secret sharing schemes

Year:
2012
Language:
english
File:
PDF, 497 KB
english, 2012
22

Steganography and authentication in image sharing without parity bits

Year:
2012
Language:
english
File:
PDF, 3.82 MB
english, 2012
29

Group Authentication

Year:
2013
Language:
english
File:
PDF, 1.16 MB
english, 2013
34

An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs

Year:
2014
Language:
english
File:
PDF, 378 KB
english, 2014
35

Efficient group Diffie–Hellman key agreement protocols

Year:
2014
Language:
english
File:
PDF, 903 KB
english, 2014
36

Multipartite Secret Sharing Based on CRT

Year:
2014
Language:
english
File:
PDF, 286 KB
english, 2014
38

Verifiable secret sharing based on the Chinese remainder theorem

Year:
2014
Language:
english
File:
PDF, 837 KB
english, 2014
45

Comments on ‘Fair (t, n) threshold secret sharing scheme’

Year:
2014
Language:
english
File:
PDF, 65 KB
english, 2014