Author of the publication

Secret Sharing Schemes with Detection of Cheaters for a General Access Structure.

, , and . Des. Codes Cryptogr., 25 (2): 175-188 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Cheaters in Vector Space Secret Sharing Schemes., , and . Des. Codes Cryptogr., 16 (1): 75-85 (1999)Generation of Key Predistribution Schemes using Secret Sharing Schemes.. Electron. Notes Discret. Math., (2001)Taking cube roots in Zm., and . Appl. Math. Lett., 15 (6): 703-708 (2002)A provably secure ID-based ring signature scheme., and . IACR Cryptology ePrint Archive, (2003)Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures., and . Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, page 286-302. Springer, (2003)Self-healing Key Distribution Schemes with Sponsorization.. Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 22-31. Springer, (2005)Secret Sharing Schemes with Bipartite Access Structure., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 500-511. Springer, (1998)Secret Sharing Schemes with Detection of Cheaters for a General Access Structure., , and . Des. Codes Cryptogr., 25 (2): 175-188 (2002)Some Protocols Useful on the Internet from Threshold Signature Schemes., , and . DEXA Workshops, page 359-363. IEEE Computer Society, (2003)Revisiting fully distributed proxy signature schemes., and . IACR Cryptology ePrint Archive, (2003)