The Detection of Cheaters in Threshold Schemes
- 1 January 1990
- book chapter
- Published by Springer Nature
- p. 564-577
- https://doi.org/10.1007/0-387-34799-2_40
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract)Published by Springer Nature ,2000
- How to share a secret with cheatersJournal of Cryptology, 1989
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- Verifiable secret sharing and achieving simultaneity in the presence of faultsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- On sharing secrets and Reed-Solomon codesCommunications of the ACM, 1981
- How to share a secretCommunications of the ACM, 1979