Results 281 to 290 of about 162,835 (326)
Hybrid Vigenere and elliptic curve cryptography technique over the finite field [Formula: see text]. [PDF]
El Bourakkadi H +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Information Processing Letters, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
Proactive secret sharing scheme suitable for asymmetric secret sharing scheme
2016 IEEE 5th Global Conference on Consumer Electronics, 2016An asymmetric secret sharing scheme (A-SSS) can set the number of servers at less than k, because it makes up to k-1 shares from one key of the owner of the secret. Therefore, the secret is not revealed even if all the servers are attacked. However, when the owner's key is stolen and attacked, shares may be leaked. Therefore, in this paper we propose a
Naoto Kaneko, Keiichi Iwamura
openaire +1 more source
Probability of shares in secret sharing schemes
Information Processing Letters, 1999zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
Ideal Secret Sharing Schemes with Multiple Secrets
Journal of Cryptology, 1996zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jackson, W.A., Martin, K., O'Keefe, C.
openaire +3 more sources
A Molecular Secret Sharing Scheme
Angewandte Chemie, 2018AbstractA method for implementing a secret sharing scheme at the molecular level is presented. By creating molecular code generators that are self‐assembled from several molecular components, we established a means for distributing distinct code‐activating elements among several participants.
Omer Lustgarten +3 more
openaire +2 more sources
2015
Suppose you have a secret s which you wish to share amongst a set P of n parties. You would like certain subsets of the n parties to recover the secret but not others. The classic scenario might be that s is a nuclear launch code and you have four people, the president, the vice-president, the secretary of state and a general in a missile silo.
openaire +1 more source
Suppose you have a secret s which you wish to share amongst a set P of n parties. You would like certain subsets of the n parties to recover the secret but not others. The classic scenario might be that s is a nuclear launch code and you have four people, the president, the vice-president, the secretary of state and a general in a missile silo.
openaire +1 more source
New Colored Visual Secret Sharing Schemes
Designs, Codes and Cryptography, 2000zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Ching-Nung, Laih, Chi-Sung
openaire +1 more source

