Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tightly Coupled Secret Sharing and Its Application to Group Authentication., , , , , and . CoRR, (2019)A secure and efficient on-line/off-line group key distribution protocol., , and . Des. Codes Cryptogr., 87 (7): 1601-1620 (2019)A Novel and Secure Secret Sharing Algorithm Applied to Insecure Networks.. Wirel. Pers. Commun., 115 (2): 1635-1650 (2020)A Universal Secret Sharing Scheme with General Access Structure Based on CRT., , , and . TrustCom/BigDataSE, page 142-148. IEEE, (2018)Threshold quantum secret sharing based on single qubit., , , and . Quantum Inf. Process., 17 (3): 64 (2018)Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem., , , , and . Secur. Commun. Networks, (2021)Threshold changeable secret sharing with secure secret reconstruction., , , and . Inf. Process. Lett., (2020)A reversible extended secret image sharing scheme based on Chinese remainder theorem., , , and . Signal Process. Image Commun., (2021)A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor., , , and . Frontiers Comput. Sci., 16 (3): 161811 (2022)A proactive secret sharing scheme based on Chinese remainder theorem., , , , , and . Frontiers Comput. Sci., 15 (2): 152801 (2021)