JOURNAL ARTICLE

Efficient verifiable multi-secret sharing scheme based on hash function

Jun Shao

Year: 2014 Journal:   Information Sciences Vol: 278 Pages: 104-109   Publisher: Elsevier BV
Keywords:
Verifiable secret sharing Computer science Scheme (mathematics) Hash function Secure multi-party computation Computer security Secret sharing Shadow (psychology) Computation Access control Theoretical computer science Cryptography Algorithm Mathematics Psychology Programming language

Metrics

38
Cited By
3.38
FWCI (Field Weighted Citation Impact)
22
Refs
0.92
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Complexity and Algorithms in Graphs
Physical Sciences →  Computer Science →  Computational Theory and Mathematics

Related Documents

JOURNAL ARTICLE

An efficient multi-use multi-secret sharing scheme based on hash function

Angsuman DasAvishek Adhikari

Journal:   Applied Mathematics Letters Year: 2010 Vol: 23 (9)Pages: 993-996
BOOK-CHAPTER

Efficient Verifiable Multi-Secret Sharing Based on Y.C.H Scheme

Appala Naidu TentuAllam Appa Rao

Communications in computer and information science Year: 2014 Pages: 100-109
JOURNAL ARTICLE

A verifiable multi-secret image sharing scheme using XOR operation and hash function

Arup Kumar ChattopadhyayAmitava NagJyoti Prakash SinghAmit Kumar Singh

Journal:   Multimedia Tools and Applications Year: 2020 Vol: 80 (28-29)Pages: 35051-35080
JOURNAL ARTICLE

Hash function‐based secret sharing scheme designs

Chi Sing ChumXiaowen Zhang

Journal:   Security and Communication Networks Year: 2012 Vol: 6 (5)Pages: 584-592
© 2026 ScienceGate Book Chapters — All rights reserved.