Search

Your search keyword '"Verifiable secret sharing"' showing total 24 results

Search Constraints

Start Over You searched for: Descriptor "Verifiable secret sharing" Remove constraint Descriptor: "Verifiable secret sharing" Database Academic Search Index Remove constraint Database: Academic Search Index
24 results on '"Verifiable secret sharing"'

Search Results

1. RaBFT: an improved Byzantine fault tolerance consensus algorithm based on raft.

2. Verifiable secret sharing with changeable access structure.

3. End-to-end data security with DMaya on IPFS: keyless secured private swarm for the closed user group.

4. Game-based security proofs for verifiable secret sharing schemes in the standard model.

5. RSU authentication in vehicular ad hoc networks base on verifiable secret sharing.

6. VSBSIS: A verifiable SVD-based secret image sharing scheme for lossless and efficient reconstruction.

7. Comparison of group key establishment protocols.

8. Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.

9. An efficient verifiable secret redistribution scheme.

10. Practical (fully) distributed signatures provably secure in the standard model.

11. A novel fast and provably secure (t,n)-threshold secret sharing construction for digital images.

12. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem.

13. Verifiable quantum ( k, n)-threshold secret sharing.

14. Verifiable Quantum ( k, n)-threshold Secret Key Sharing.

15. An improvement on the Lin–Wu <f>(t,n)</f> threshold verifiable multi-secret sharing scheme

16. Improvement of threshold proxy signature scheme

17. An Efficient and Secure Fault-tolerant Conference-Key Distribution Scheme.

18. Improvement of threshold proxy signature scheme

19. Distributed secret sharing scheme based on the high-dimensional rotation paraboloid.

20. Certificateless threshold signature scheme from bilinear maps

21. Strong (n, t, n) verifiable secret sharing scheme

22. A verifiable secret sharing scheme with combiner verification and cheater identification.

23. Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities.

24. An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.

Catalog

Books, media, physical & digital resources