Showing 1 - 20 results of 857 for search '"secret sharing"', query time: 1.80s Refine Results
  1. 1
  2. 2
    by Wang Daoshun, Yi Feng
    Published 2010-01-01
    ...<p>Abstract</p> <p>Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same...
    Get full text
    Article
  3. 3
    by Csirmaz Laszlo
    Published 2020-11-01
    Subjects: ...secret sharing...
    Get full text
    Article
  4. 4
    by Reyzin, Alissa Natanovna
    Published 2009
    ... for a variety of player types. A keystone functionality used in cryptography is Secret Sharing. While...
    Get full text
    Others
  5. 5
  6. 6
    by Johansson, Håkan
    Published 2020
    ...In this thesis, four different methods for secret sharing with threshold schemes...
    Get full text
    Others
  7. 7
    by TSAI, YING-ZHEN, 蔡穎榛
    Published 2018
    ...碩士 === 銘傳大學 === 資訊工程學系碩士班 === 106 === The aim of a (k, n) threshold secret sharing scheme...
    Get full text
    Others
  8. 8
  9. 9
    by Josef Pieprzyk, Xian-Mo Zhang
    Published 2004-12-01
    ...The paper addresses the cheating prevention in secret sharing. We consider secret sharing...
    Get full text
    Article
  10. 10
    by Farràs Ventura, Oriol
    Published 2010
    ...This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods...
    Get full text
    Doctoral Thesis
  11. 11
    by Johannes Rauh
    Published 2017-11-01
    Subjects: ...secret sharing...
    Get full text
    Article
  12. 12
    by Dibert Alexander, Csirmaz László
    Published 2014-06-01
    Subjects: ...secret sharing...
    Get full text
    Article
  13. 13
    by Hsiao-Hsuan Lin, 林筱旋
    Published 2010
    ...碩士 === 臺北市立教育大學 === 資訊科學系碩士班 === 99 === Secret sharing is an elegant approach for safeguarding...
    Get full text
    Others
  14. 14
    by I-Ching Yu, 余怡青
    Published 2007
    ...。One of them is Quantum Key Distribution (QKD),the other is Quantum Secret Sharing (QSS)。QKD...
    Get full text
    Others
  15. 15
  16. 16
  17. 17
    by Schultz, David Andrew
    Published 2008
    ... references (p. 153-157). === This thesis describes mobile proactive secret sharing (MPSS), an extension...
    Get full text
    Others
  18. 18
  19. 19
    by Alazemi, A., Ghebleh, M., Kanso, A.
    Published 2022
    Subjects: ...essential secret sharing...
    View Fulltext in Publisher
    Article
  20. 20
    by Chao-Wei He, 何昭洧
    Published 2018
    .... Therefore, a secret sharing system based upon QR code is proposed in this article. The method generates n...
    Get full text
    Others