Secret sharing using the Chinese remainder theorem

Results: 6



#Item
1An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li ∗

An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 06:38:57
2Secure Computation from Random Error Correcting Codes Hao Chen1 , Ronald Cramer2 , Shafi Goldwasser3 , Robbert de Haan4 , and Vinod Vaikuntanathan5 1

Secure Computation from Random Error Correcting Codes Hao Chen1 , Ronald Cramer2 , Shafi Goldwasser3 , Robbert de Haan4 , and Vinod Vaikuntanathan5 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:27
3Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasail˘a, Vlad Alexa, Sorin Iftene

Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasail˘a, Vlad Alexa, Sorin Iftene

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-01 13:36:48
4doi:[removed]j.entcs[removed]

doi:[removed]j.entcs[removed]

Add to Reading List

Source URL: www.fatih.edu.tr

Language: English - Date: 2012-04-06 09:39:19
5IEEE TRANSACTIONS  ON INFORMATION

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:41:04
6

PDF Document

Add to Reading List

Source URL: www.cs.bgu.ac.il

Language: English - Date: 2011-02-28 08:41:34