1 |
ZHOU X K , YANG X , MA J H , et al. Energy-efficient smart routing based on link correlation mining for wireless edge computing in IoT. IEEE Internet of Things Journal, 2021, 9 (16): 14988- 14997.
|
2 |
SHAMIR A . How to share a secret. Communications of the ACM, 1979, 22 (11): 612- 613.
doi: 10.1145/359168.359176
|
3 |
BLAKLEY G R. Safeguarding cryptographic keys[C]//Proceedings of the International Workshop on Managing Requirements Knowledge (MARK). Washington D.C., USA: IEEE Press, 1979: 313-313.
|
4 |
GHAVAMIPOUR A R , TURKMEN F , JIANG X Q . Privacy-preserving logistic regression with secret sharing. BMC Medical Informatics and Decision Making, 2022, 22 (1): 89.
doi: 10.1186/s12911-022-01811-y
|
5 |
BISHT K , DESHMUKH M . A novel approach for multilevel multisecret image sharing scheme. Journal of Supercomputing, 2021, 77 (10): 1- 35.
|
6 |
YAN X H , LI J H , PAN Z L , et al. Multiparty verification in image secret sharing. Information Sciences, 2021, 562, 475- 490.
doi: 10.1016/j.ins.2021.03.029
|
7 |
XIONG L , ZHONG X , YANG C N , et al. Transform domainbased invertible and lossless secret image sharing with authentication. IBEE Transactions on Information Forensics and Security, 2021, 16, 2912- 2925.
doi: 10.1109/TIFS.2021.3065794
|
8 |
CHOR B, GOLDWASSER S, MICALI S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[C]//Proceedings of the 26th Annual Symposium on Foundations of Computer Science. Washington D.C., USA: IEEE Press, 1985: 383-395.
|
9 |
FELDMAN P. A practical scheme for non-interactive verifiable secret sharing[C]//Proceedings of the 28th Annual Symposium on Foundations of Computer Science. Washington D.C., USA: IEEE Press, 1987: 427-438.
|
10 |
|
11 |
HARN L . Efficient sharing (broadcasting) of multiple secrets. IEE Proceedings-Computers and Digital Techniques, 1995, 142 (3): 237.
doi: 10.1049/ip-cdt:19951874
|
12 |
麻敏, 李志慧, 徐廷廷. 可验证的(n, n)门限量子秘密共享方案. 计算机工程, 2017, 43 (8): 169- 172.
doi: 10.3969/j.issn.1000-3428.2017.08.028
|
|
MA M , LI Z H , XU T T . Verifiable (n, n) threshold quantum secret sharing scheme. Computer Engineering, 2017, 43 (8): 169- 172.
doi: 10.3969/j.issn.1000-3428.2017.08.028
|
13 |
|
14 |
CHANDRAMOULI A , CHOUDHURY A , PATRA A . A survey on perfectly secure verifiable secret-sharing. ACM Computing Surveys, 2022, 54 (11s): 1- 36.
|
15 |
|
16 |
|
17 |
|
18 |
MASHHADI S , HADIAN DEHKORDI M , KIAMARI N . Provably secure verifiable multi-stage secret sharing scheme based on monotone span program. IET Information Security, 2017, 11 (6): 326- 331.
doi: 10.1049/iet-ifs.2017.0111
|
19 |
谷婷, 简小明, 彭晓良, 等. 无可信中心可公开验证可更新的多秘密共享. 计算机应用研究, 2020, 37 (S1): 293- 297.
|
|
GU T , JIAN X M , PENG X L , et al. Multi-secret sharing without trusted center that can be publicly verified and updated. Application Research of Computers, 2020, 37 (S1): 293- 297.
|
20 |
BAGHERPOUR B . An efficient verifiable secret redistribution scheme. Journal of Information Security and Applications, 2022, 69, 103295.
doi: 10.1016/j.jisa.2022.103295
|
21 |
IWAMURA K , KAMAL A A A M . Simple approach to realizing verifiable secret sharing for secure cloud system. IEEE Access, 2022, 10, 76794- 76804.
doi: 10.1109/ACCESS.2022.3192645
|
22 |
宋云, 王宁宁, 肖孟林, 等. 一般存取结构上可公开验证的多级秘密共享. 计算机科学与探索, 2023, 17 (5): 1189- 1200.
|
|
SONG Y , WANG N N , XIAO M L , et al. Multilevel secret sharing with public verifiability on general access structures. Journal of Frontiers of Computer Science and Technology, 2023, 17 (5): 1189- 1200.
|
23 |
TOMPA M , WOLL H . How to share a secret with cheaters. Journal of Cryptology, 1989, 1 (3): 133- 138.
doi: 10.1007/BF02252871
|
24 |
LIN H Y , HARN L . Fair reconstruction of a secret. Information Processing Letters, 1995, 55 (1): 45- 47.
doi: 10.1016/0020-0190(95)00045-E
|
25 |
张本慧, 解晓娟, 唐元生. 无条件安全的公平秘密共享方案. 密码学报, 2017, 4 (6): 537- 544.
|
|
ZHANG B H , XIE X J , TANG Y S . Fair secret sharing scheme with unconditional security. Journal of Cryptologic Research, 2017, 4 (6): 537- 544.
|
26 |
刘海, 李兴华, 田有亮, 等. 理性公平的秘密共享方案. 计算机学报, 2020, 43 (8): 1517- 1533.
|
|
LIU H , LI X H , TIAN Y L , et al. Rational fair secret sharing scheme. Chinese Journal of Computers, 2020, 43 (8): 1517- 1533.
|
27 |
ZHANG E , LI M , YIU S M , et al. Fair hierarchical secret sharing scheme based on smart contract. Information Sciences, 2021, 546, 166- 176.
doi: 10.1016/j.ins.2020.07.032
|
28 |
卫宏儒, 李思月, 郭涌浩. 基于智能合约的秘密重建协议. 计算机科学, 2022, 49 (S1): 469- 473.
|
|
WEI H R , LI S Y , GUO Y H . Secret reconstruction protocol based on smart contract. Computer Science, 2022, 49 (S1): 469- 473.
|
29 |
YUAN J T , YANG J , WANG C Y , et al. A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations. Information Sciences, 2022, 592, 36- 49.
doi: 10.1016/j.ins.2022.01.053
|
30 |
SHI R N , CHEN Y L , TAN C Y , et al. ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism. Journal of Cloud Computing, 2023, 12 (1): 117.
doi: 10.1186/s13677-023-00495-7
|
31 |
LI F L , CHEN T Y , ZHU S X . A (t, n) threshold quantum secret sharing scheme with fairness. International Journal of Theoretical Physics, 2023, 62 (6): 119.
doi: 10.1007/s10773-023-05383-z
|
32 |
BAI C M , ZHANG S J , LIU L . Fair quantum secret sharing based on symmetric bivariate polynomial. Physica A: Statistical Mechanics and Its Applications, 2022, 589, 126673.
doi: 10.1016/j.physa.2021.126673
|