A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear...
Saved in:
Main Authors: | Ping Li, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, Alzubair Hassan |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2020-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2020/1784276 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Leakage-resilient certificateless signcryption scheme
by: Yan-lin QIN, et al.
Published: (2017-11-01) -
Novel and effective secret sharing scheme
by: Run-hua SHI, et al.
Published: (2012-01-01) -
Constant-round fair rational secret sharing scheme
by: Meng-hui LI, et al.
Published: (2017-01-01) -
Anonymous whistleblowers reply scheme based on secret sharing
by: HE Kun, et al.
Published: (2024-12-01) -
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
by: XU Jing-fang1, et al.
Published: (2009-01-01)