2019
DOI: 10.1016/j.ins.2019.04.061
|View full text |Cite
|
Sign up to set email alerts
|

A fully dynamic secret sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 12 publications
0
14
0
Order By: Relevance
“…Furthermore, the processing time of the proposed scheme is always lower than that of the scheme in literature. 19 Therefore, the proposed key management scheme is more suitable for larger scale satellite networks.…”
Section: Processing Time Analysismentioning
confidence: 99%
“…Furthermore, the processing time of the proposed scheme is always lower than that of the scheme in literature. 19 Therefore, the proposed key management scheme is more suitable for larger scale satellite networks.…”
Section: Processing Time Analysismentioning
confidence: 99%
“…In this section, we give a brief description of the secret sharing schemes and the LHR relations [29].…”
Section: Preliminarymentioning
confidence: 99%
“…There are two different types multi-secret sharing schemes. The first type is that the secrets are recovered at the same time [9,19,29]. The second type is that for the different importance of different secrets, these secrets are recovered in a different stage [5,15,17,18,21], i.e., the qualified subset can recover only one secret in each stage.…”
mentioning
confidence: 99%
See 2 more Smart Citations