Multiple Threshold Schemes Under The Weak Secure Condition

J Wu, N Liu, W Kang - arXiv preprint arXiv:2312.05737, 2023 - arxiv.org
In this paper, we consider the case that sharing many secrets among a set of participants
using the threshold schemes. All secrets are assumed to be statistically independent and the …

A new distribution version of Boneh-Goh-Nissim cryptosystem: Security and performance analysis

O Benamara, F Merazka - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
The aim of this paper is to provide two distributed versions of the Boneh-Goh-Nissim
Cryptosystem (BGNC). We give a proof of the semantic security for the first one. This …

One-out-of-q OT Combiners

O Farràs, J Ribes-González - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
In 1-out-of-Oblivious Transfer (OT) protocols, a sender Alice is able to send one of messages
to a receiver Bob, all while being oblivious to which message was transferred. Moreover, the …

The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures

C Tang, S Dai - Acta Mathematicae Applicatae Sinica, English Series, 2014 - Springer
In a linear multi-secret sharing scheme with non-threshold structures, several secret values
are shared among n participants, and every secret value has a specified access structure …

Gruppen secret sharing or how to share several secrets if you must?

L Csirmaz - Mathematica Slovaca, 2013 - degruyter.com
Each member of an n-person team has a secret, say a password. The k out of n gruppen
secret sharing requires that any group of k members should be able to recover the secrets of …

[PDF][PDF] A Complete Bibliography of Publications in Information Processing Letters: 2010–2019

NHF Beebe - 2024 - ctan.math.utah.edu
A Complete Bibliography of Publications in Information Processing Letters: 2010–2019
Page 1 A Complete Bibliography of Publications in Information Processing Letters: 2010–2019 …

[引用][C] 基于层次结构的大数据秘密共享方案

刘炜, 杨道平, 简岩 - 吉林大学学报: 理学版, 2016

[引用][C] Gruppen secret sharing, or how to share several secrets if you must?

L Csirmaz - Tatra Mountain Publications, 2012 - Research Groups> Theoretical …

[引用][C] Gruppen secret sharing

L Csirmaz - arXiv preprint arXiv:1310.4652, 2013