2009 IEEE International Conference on Network Infrastructure and Digital Content 2009
DOI: 10.1109/icnidc.2009.5360821
|View full text |Cite
|
Sign up to set email alerts
|

A secret sharing scheme based on Near-MDS codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 6 publications
0
15
0
1
Order By: Relevance
“…. , R ′ 5 are found to be (2, 7), (10, 2), (5, 2), (2, 4), (7,9) and (8,8), respectively. Now, since m ≤ n, the polynomial g(x) will be of order 6 [which is n + m − 1 as in (3)] and is given as below…”
Section: Numerical Examplementioning
confidence: 94%
See 3 more Smart Citations
“…. , R ′ 5 are found to be (2, 7), (10, 2), (5, 2), (2, 4), (7,9) and (8,8), respectively. Now, since m ≤ n, the polynomial g(x) will be of order 6 [which is n + m − 1 as in (3)] and is given as below…”
Section: Numerical Examplementioning
confidence: 94%
“…when the number of secrets is less than the threshold), there will be 2n + 1 public values in Hadian and Mashhadi's scheme. We (5,2), (8,3), (10,2), (3,6), (7,9), (7,2), (3,5), (10,9), (8,8), (5,9), (2,4), (0, 0)}…”
Section: Critical Comparison Of Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…We can similarly design a scheme as in [13] and [19] by using free MDR codes and free near-MDR codes, and then obtain by using Corollary 1 that this scheme is both perfect (k + 1, n)-threshold and ideal, furthermore, we can similarly give the characterization of cheating detection and cheater identification of the scheme (see [13] and [19] for details).…”
Section: The Weight Distribution Of a Free Near-mdr Codementioning
confidence: 99%