How to avoid the cheaters succeeding in the key sharing scheme
- 1 July 1993
- journal article
- research article
- Published by Springer Nature in Designs, Codes and Cryptography
- Vol. 3 (3) , 221-228
- https://doi.org/10.1007/bf01388483
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- The Detection of Cheaters in Threshold SchemesPublished by Springer Nature ,1990
- How to share a secret with cheatersJournal of Cryptology, 1989
- On sharing secrets and Reed-Solomon codesCommunications of the ACM, 1981
- Protecting Shared Cryptographic KeysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- How to share a secretCommunications of the ACM, 1979