4
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Information Theoretic Security 

      Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Article: not found

          New hash functions and their use in authentication and set equality

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Safeguarding cryptographic keys

            G Blakley (1979)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              How to share a secret with cheaters

                Bookmark

                Author and book information

                Book Chapter
                2016
                November 10 2016
                : 3-23
                10.1007/978-3-319-49175-2_1
                509f3d2e-a3e5-45c0-9a07-56ac724ac447
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,152

                Cited by4