Citation: | MIAO Fuyou, WANG Li, JI Yangyang, et al., “GOMSS: A Simple Group Oriented (t, m, n) Multi-secret Sharing Scheme,” Chinese Journal of Electronics, vol. 26, no. 3, pp. 557-563, 2017, doi: 10.1049/cje.2016.08.014 |
A. Shamir, "How to share a secret", Communications of the ACM, Vol.22, No.11, pp.612-613, 1979.
|
G. Blakley, "Safeguarding cryptographic keys", Proc.AFIPS 1979 Natl.Conf, pp.313-317, 1979.
|
W.A. Jackson, K.M. Martin and C.M. O.Keefe, "On sharing many secrets", Asiacrypt94, pp.42-54, 1994.
|
H.-Y. Chien, J.-K. Jan and Y-M. Tseng, "A practical (t,n) multi-secret sharing scheme", IEICE Transactions on Fundamentals, Vol.E83-A, No.12, pp.2792-2765, 2000.
|
C.C. Yang, T.Y. Chang and M.S. Hwang, "A (t,n) multisecret sharing scheme", Applied Mathematics and Computation, Vol.151, No.2, pp.483-490, 2004.
|
L.J. Pang and Y.M. Wang, "A new (t,n) multi-secret sharing scheme based on Shamirs secret sharing", Applied Mathematics and Computation, Vol.167, No.2, pp.840-848, 2005.
|
J. Shao and Z. Cao, "A new efficient (t,n) Verifiable multi-secret sharing (VMSS) based on YCH scheme", Applied Mathematics and Computation, Vol.168, No.1, pp.135-140, 2005.
|
Z. Eslami and S.K. Rad, "A new verifiable multi-secret sharing scheme based on bilinear maps" Wireless Personal Communications, Vol.63, No.2, pp.459-467, 2012.
|
S.J. Wang, Y.R. Tsai and C.C. Shen, "Verifiable threshold scheme in multi-secret sharing distributions upon extensions of ECC", Wireless Personal Communications, Vol.56, No.1, pp.173-182, 2011.
|
C. Lin and L. Harn, "Unconditionally secure multi-secret sharing scheme", IEEE International Conference on Computer Science and Automation Engineering (CSAE), Vol.1, pp.169-172, 2012.
|
L. Harn, "Secure secret reconstruction and multi-secret sharing schemes with unconditional security", Security and Communication Networks, Vol.7, No.3, pp.567-573, 2014.
|
J. He and E. Dawson, "Multistage secret sharing based on one way function", Electronic Letters, Vol.30, No.19, pp.1591-1592, 1994.
|
L. Harn, "Efficient sharing (broadcasting) of multiple secrets", IEE Computers and Digital Techniques, Vol.142, No.3, pp.237-240, 1995.
|
C. Tang and Z.-A. Yao, "A new (t,n)-threshold secret sharing scheme", Proc. of 2008 International Conference on Advanced Computer Theory and Engineering-ICACTE08, pp.920-924, 2008.
|
X. Zhang, L. Zhang, Q. Zhang and C. Tang, "A secret sharing shuffling scheme based on polynomial", Proc. of 2008 IEEE International Conference on Information and Automation, pp.1746-1750, 2008.
|
Ch-Q. Hu, X-F. Liao and X-ZH. Cheng, "Verifiable multi-secret sharing based on LFSR sequences", Theoretical Computer Science, Vol.445, No.11, pp.52-62, 2012.
|
H. Zhao, J.Z. Sun, F. Wang, et al., "A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial", Security and Communication Networks, Vol.6, No.9, pp.1169-1175, 2013.
|
Y.X. Liu, L. Harn, C.N. Yang, et al., "Efficient (n,t,n) secret sharing schemes", Journal of Systems and Software, Vol.85, No.6, pp.1325-1332, 2012.
|