Author of the publication

A proactive secret sharing scheme based on Chinese remainder theorem.

, , , , , and . Frontiers Comput. Sci., 15 (2): 152801 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ideal Tightly Couple (t, m, n) Secret Sharing., , , , and . CoRR, (2019)Threshold changeable secret sharing with secure secret reconstruction., , , and . Inf. Process. Lett., (2020)Threshold quantum secret sharing based on single qubit., , , and . Quantum Inf. Process., 17 (3): 64 (2018)A Universal Secret Sharing Scheme with General Access Structure Based on CRT., , , and . TrustCom/BigDataSE, page 142-148. IEEE, (2018)A secure and efficient on-line/off-line group key distribution protocol., , and . Des. Codes Cryptogr., 87 (7): 1601-1620 (2019)Tightly Coupled Secret Sharing and Its Application to Group Authentication., , , , , and . CoRR, (2019)A Novel and Secure Secret Sharing Algorithm Applied to Insecure Networks.. Wirel. Pers. Commun., 115 (2): 1635-1650 (2020)Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem., , , , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 310-331. Springer, (2018)Verifiable threshold quantum secret sharing with sequential communication., , , and . Quantum Inf. Process., 17 (11): 310 (2018)Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem., , , and . Discret. Appl. Math., (2019)