Anonymous whistleblowers reply scheme based on secret sharing
Existing anonymous communication systems that resisted traffic analysis could hide the identities of the communicating parties from the attacker. However, the identities of the communicating parties couldn’t be hidden from each other, and thus these systems did not apply to the scenario of anonymous...
Saved in:
Main Authors: | HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-12-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024272/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate
by: Ryutaroh Matsumoto
Published: (2025-01-01) -
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
by: Vincent Omollo Nyangaresi, et al.
Published: (2025-01-01) -
Protection of whistleblowers in Serbia: The role and importance of whistleblowers in revealing corruption
by: Tanjević Nataša
Published: (2017-01-01) -
WHISTLEBLOWING IN CIVIL SERVICE: EXPERIENCE OF EUROPE
by: M. A. Batishcheva
Published: (2014-06-01) -
Additional Legal Protection for Corruption Whistleblowers
by: Ahmad Irzal Fardiansyah, et al.
Published: (2024-04-01)