Amanote Research
Register
Sign In
Threshold Cryptosystem With Multiple Secret Sharing Policies
IEE Proceedings - Computers and Digital Techniques
doi 10.1049/ip-cdt:19941003
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 1994
Authors
L. Harn
H.-Y. Lin
S. Yang
Publisher
Institution of Engineering and Technology (IET)
Related search
Verifiable Essential Secret Image Sharing With Multiple Decryptions
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
A Fair (T,n) Threshold Secret Sharing Scheme
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Designing Robust LMCA-based Threshold Secret Sharing Scheme for Digital Images Using Multiple Configurations Assignment
Journal of Communications Software and Systems
Electronic Engineering
Electrical
Software
Efficient Threshold Password-Authenticated Secret Sharing Protocols for Cloud Computing
Journal of Parallel and Distributed Computing
Computer Networks
Hardware
Communications
Architecture
Theoretical Computer Science
Artificial Intelligence
Software
Geometric Realization of Electronic Elections Based on Threshold Secret Sharing
Vestnik of Don State Technical University
Secret Sharing With Public Reconstruction
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Secret Sharing With Reusable Polynomials
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
Algebraic Structures and their Applications
Applied Mathematics
Number Theory
Algebra