Anonymous whistleblowers reply scheme based on secret sharing
Existing anonymous communication systems that resisted traffic analysis could hide the identities of the communicating parties from the attacker. However, the identities of the communicating parties couldn’t be hidden from each other, and thus these systems did not apply to the scenario of anonymous...
Saved in:
Main Authors: | HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-12-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024272/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Protection of whistleblowers in Serbia: The role and importance of whistleblowers in revealing corruption
by: Tanjević Nataša
Published: (2017-01-01) -
Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate
by: Ryutaroh Matsumoto
Published: (2025-01-01) -
Analysis of Whistleblowing in Academia
by: Francisco Valente Gonçalves, et al.
Published: (2025-01-01) -
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
by: XU Jing-fang1, et al.
Published: (2009-01-01) -
WHISTLEBLOWING IN CIVIL SERVICE: EXPERIENCE OF EUROPE
by: M. A. Batishcheva
Published: (2014-06-01)