Found 18 Documents (Results 1–18)
Ramp secret sharing with cheater identification in presence of rushing cheaters. (English) Zbl 1455.94218
Microbial cross-feeding promotes multiple stable states and species coexistence, but also susceptibility to cheaters. (English) Zbl 1406.92691
Hierarchical secret sharing schemes secure against rushing adversary: cheater identification and robustness. (English) Zbl 1518.94122
Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 578-594 (2018).
Efficient threshold secret sharing schemes secure against rushing cheaters. (English) Zbl 1407.94166
Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 3-23 (2016).
MSC:
94A62
Cheater identifiable secret sharing schemes via multi-receiver authentication. (English) Zbl 1394.94947
Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-09842-5/pbk). Lecture Notes in Computer Science 8639, 72-87 (2014).
MSC:
94A62
On cheater identifiable secret sharing schemes secure against rushing adversary. (English) Zbl 1344.94085
Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41382-7/pbk). Lecture Notes in Computer Science 8231, 258-271 (2013).
MSC:
94A62
Almost optimum \(t\)-cheater identifiable secret sharing schemes. (English) Zbl 1281.94048
Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 284-302 (2011).
MSC:
94A60
Control in mutualisms: combined implications of partner choice and bargaining roles. (English) Zbl 1414.92218
A verifiable threshold multi-secret sharing scheme. (Chinese. English summary) Zbl 1199.94095
MSC:
94A62
Interactive effects of builders and exploiters on environmental quality and the outcome of competition between the two. (English) Zbl 1453.92347
MSC:
92D40
Dynamic threshold and cheater resistance for Shamir secret sharing scheme. (English) Zbl 1172.94626
Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 103-117 (2006).
A \((t, n)\) threshold secret sharing system with efficient identification of cheaters. (English) Zbl 1158.94397
An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme. (English) Zbl 1069.94020
On construction of cumulative secret sharing schemes. (English) Zbl 0931.94023
Boyd, Colin (ed.) et al., Information security and privacy. 3rd Australasian conference, ACISP ’98, Brisbane, Australia, July 13–15, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1438, 379-390 (1998).
MSC:
94A60
Filter Results by …
Document Type
- Journal Articles (11)
- Collection Articles (7)
all
top 5
Author
- Morozov, Kirill Evgen’evich (4)
- Adhikari, Avishek (3)
- Xu, Rui (3)
- Chang, Chin-Chen (2)
- Golubski, Antonio J. (2)
- Klausmeier, Christopher A. (2)
- Obana, Satoshi (2)
- Sakurai, Kouichi (2)
- Sarathi Roy, Partha (2)
- Takagi, Tsuyoshi (2)
- Wang, Huaxiong (2)
- Chang, Ting-Yi (1)
- Dutta, Sabyasachi (1)
- Fukushima, Kazuhide (1)
- Ghodosi, Hossein (1)
- Grimaud, Ghjuvan M. (1)
- Hwang, Minshiang (1)
- Jin, Wanxue (1)
- Kiyomoto, Shinsaku (1)
- Koffel, Thomas (1)
- Lee, Jung-San (1)
- Li, Huixian (1)
- Li, Tien-Yien (1)
- Li, Zhijie (1)
- Lin, Iuon-Chang (1)
- Lin, Peiyu (1)
- Liu, Xianning (1)
- Pang, Liaojun (1)
- Pieprzyk, Josef P. (1)
- Pramanik, Jyotirmoy (1)
- Safavi-Naini, Reihaneh (1)
- Sauer, Timothy D. (1)
- Stump, Simon Maccracken (1)
- Sun, Zepeng (1)
- Tartary, Christophe (1)
- Verschelde, Jan (1)
- Wang, Yumin (1)
- Yang, Wei-Pang (1)
- Yorke, James Alan (1)
all
top 5
Serial
- J. Theor. Biol. (3)
- Appl. Math. Comput. (1)
- SIAM J. Numer. Anal. (1)
- J. Biomath. (1)
- Pattern Recognition (1)
- Exp. Math. (1)
- J. Harbin Inst. Technol. (1)
- Comput. Inform. (1)
- Groups Complex. Cryptol. (1)