A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme

Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear...

Full description

Saved in:
Bibliographic Details
Main Authors: Ping Li, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, Alzubair Hassan
Format: Article
Language:English
Published: Wiley 2020-01-01
Series:Complexity
Online Access:http://dx.doi.org/10.1155/2020/1784276
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items