We introduce two publicly cheater identifiable secret sharing (CISS) schemes with efficient reconstruction, tolerating t
CITATION STYLE
Xu, R., Morozov, K., & Takagi, T. (2014). Cheater identifiable secret sharing schemes via multi-receiver authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8639 LNCS, pp. 72–87). Springer Verlag. https://doi.org/10.1007/978-3-319-09843-2_6
Mendeley helps you to discover research relevant for your work.