Search

Your search keyword '"Verifiable secret sharing"' showing total 41 results

Search Constraints

Start Over You searched for: Descriptor "Verifiable secret sharing" Remove constraint Descriptor: "Verifiable secret sharing" Journal information sciences Remove constraint Journal: information sciences
41 results on '"Verifiable secret sharing"'

Search Results

1. A verifiable multi-party quantum key distribution protocol based on repetitive codes

2. An efficient fine-grained data access control system with a bounded service number

3. Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme

4. Verifiable single-server private information retrieval from LWE with binary errors

5. Privacy-preserving and verifiable online crowdsourcing with worker updates

6. A distributed networked system for secure publicly verifiable self-tallying online voting

7. Blockchain-based two-party fair contract signing scheme

8. Verifiable inner product computation on outsourced database for authenticated multi-user data sharing

9. A verifiable multiparty quantum key agreement based on bivariate polynomial

10. LSC: Online auto-update smart contracts for fortifying blockchain-based log systems

11. A verifiable threshold secret sharing scheme based on lattices

12. Universal designated verifier signature scheme with non-delegatability in the standard model

13. Efficient attribute-based encryption with attribute revocation for assured data deletion

14. Verifiable outsourced computation over encrypted data

15. Enabling verifiable multiple keywords search over encrypted cloud data

16. Access control encryption with efficient verifiable sanitized decryption

17. Reversible data hiding based on Shamir’s secret sharing for color images over cloud

18. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem.

19. Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data

20. Secure publicly verifiable and proactive secret sharing schemes with general access structure

21. Realizing secret sharing with general access structure

22. Processing secure, verifiable and efficient SQL over outsourced database

23. Universal designated verifier transitive signatures for graph-based big data

24. Certificateless threshold signature scheme from bilinear maps

25. Strong (n, t, n) verifiable secret sharing scheme

26. Prevention of cheating in visual cryptography by using coherent patterns

27. Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem

28. Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation

29. Efficient verifiable multi-secret sharing scheme based on hash function

30. Protecting secret documents via a sharing and hiding scheme

31. Two extensions of the ring signature scheme of Rivest–Shamir–Taumann

32. Multi-image encryption by circular random grids

33. Visual multiple secret sharing based upon turning and flipping

34. Meaningful secret sharing technique with authentication and remedy abilities

35. An ideal multi-secret sharing scheme based on MSP

36. Space efficient secret sharing for implicit data security

37. Certificateless threshold signature scheme from bilinear maps

38. Strong (n,t,n) verifiable secret sharing scheme

39. A verifiable multi-secret sharing scheme based on cellular automata

40. New efficient and practical verifiable multi-secret sharing schemes

41. Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes

Catalog

Books, media, physical & digital resources