BOOK-CHAPTER

Verifiable Rational Multi-secret Sharing Scheme

Yongquan CaiZhanhai LuoYi Yang

Year: 2011 Communications in computer and information science Pages: 42-48   Publisher: Springer Science+Business Media
Keywords:
Verifiable secret sharing Secret sharing Correctness Cheating Homomorphic secret sharing Computer science Scheme (mathematics) Discrete logarithm Computer security Theoretical computer science Cryptography Mathematics Algorithm Public-key cryptography

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
26
Refs
0.00
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Verifiable Rational Secret Sharing Scheme in Mobile Networks

Zhang EnPeiyan YuanJiao Du

Journal:   Mobile Information Systems Year: 2015 Vol: 2015 Pages: 1-7
JOURNAL ARTICLE

Verifiable hierarchical threshold multi-secret sharing scheme

Mao Ying-yingMing MaoYanshuo Zhang

Journal:   Journal of Computer Applications Year: 2009 Vol: 29 (1)Pages: 172-174
JOURNAL ARTICLE

A Verifiable Multi-secret Sharing Scheme (VMSS)

Liaojun PangHuixian LiLicheng JiaoYumin Wang

Journal:   2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007) Year: 2007 Vol: e83 a Pages: 749-752
JOURNAL ARTICLE

On Novel Verifiable Multi-Secret Sharing Scheme

Jian WangYanheng LiuYanxi Wang

Journal:   Advanced Science Letters Year: 2011 Vol: 4 (11)Pages: 3709-3715
JOURNAL ARTICLE

A practical verifiable multi-secret sharing scheme

Jianjie ZhaoJianzhong ZhangRong Zhao

Journal:   Computer Standards & Interfaces Year: 2006 Vol: 29 (1)Pages: 138-141
© 2026 ScienceGate Book Chapters — All rights reserved.