Fair reconstruction of a secret
References (6)
Safeguarding cryptographic keys
- E.F. Brickle and D.R. Stinson, The detection of cheaters in threshold schemes, in: Proc. Crypto '88 (Springer, Berlin)...
- et al.
Multipary unconditionally secure protocols
There are more references available in the full text version of this article.
Cited by (26)
Fair secret reconstruction in (t, n) secret sharing
2015, Journal of Information Security and ApplicationsInformation-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments
2022, Journal of Cloud ComputingBinary Symmetric Polynomial-Based Protected Fair Secret Sharing and Secure Communication over Satellite Networks
2022, Wireless Communications and Mobile ComputingProtected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network
2022, Computers, Materials and ContinuaFair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
2020, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)Continuous variable quantum secret sharing with fairness
2020, Applied Sciences (Switzerland)
Copyright © 1995 Published by Elsevier B.V.