Anonymous whistleblowers reply scheme based on secret sharing

Existing anonymous communication systems that resisted traffic analysis could hide the identities of the communicating parties from the attacker. However, the identities of the communicating parties couldn’t be hidden from each other, and thus these systems did not apply to the scenario of anonymous...

Full description

Saved in:
Bibliographic Details
Main Authors: HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024272/
Tags: Add Tag
No Tags, Be the first to tag this record!