[1] |
LIU Ning-chun, GAO Shuai, HOU Xin-di, GUO Xing-chang.
A Data Access Control Scheme in Information-Centric Mobile Ad Hoc Networks
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 54-60.
|
[2] |
SHEN Hua, CHEN Mi-wen, ZHANG Ming-wu.
Leakage-Resilient Verifiable Multi-Secret Sharing Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 87-91.
|
[3] |
CHANG Li-wei, ZHENG Shi-hui, XING You-song, JIN Lei, YANG Yi-xian.
Verifiable Multi-Use Dynamic Threshold Large Secret Sharing Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 86-90.
|
[4] |
.
A Verifiable MultiPolicy Secret Sharing Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 72-75.
|
[5] |
YU Jia1,HAO Rong1,2,KONG Fan-yu2, LI Xu-liang1,2 .
Proactive and Publicly Verifiable Server-Assisted Secret Sharing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(5): 13-17.
|
[6] |
MO Jiao, WEN Qiao-yan.
The Constructions of Symmetric
Correlation Immune Functions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(3): 59-62.
|
[7] |
LIN Song1,2, QIN Su-juan1, CHEN Xiu-bo1, WEN Qiao-yan1, ZHU Fu-chen3.
A (n-1, n) Threshold Quantum Secret Sharing Scheme Based on Entanglement Swapping
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 26-29.
|
[8] |
SUN Ying1, QIN Su-juan1, WEN Qiao-yan1, ZHU Fu-chen2.
利用GHZ态实现可控的量子秘密共享
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(1): 9-13.
|
[9] |
ZHANG Yan-Shuo 1,2, LIU Zhuo-Jun2.
Dynamic Generalized Threshold Multi-Secret Sharing Scheme among Weighted Participants
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(1): 130-134.
|
[10] |
TONG Xin1, WEN Qiao-yan1, ZHU Fu-chen2.
Quantum Secret Sharing Based on GHZ States Entanglement Swapping
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(1): 44-48.
|
[11] |
MO Jiao, WEN Qiao-yan.
The Construction and Enumeration of Symmetric Correlation Immune Functions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(1): 49-52.
|
[12] |
YU Jia1, LI Guo-wen2, HAO Rong1,2, CHENG Zhen3.
A Practical Member Enrollment Protocol for Threshold Schemes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(s2): 1-3.
|
[13] |
YU Jia1; HAO Rong1,2; ZHAO Zhi-gang1; LI DA-xing2 .
A Forward-Secure Proactive Threshold Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(s2): 24-29.
|
[14] |
ZHANG Wen-ying1,WU Chuan-kun1,LEI Hong2.
A New Cheating Immune Secret Sharing Function
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(4): 54-56.
|
[15] |
YANG Yu-guang1 WEN Qiao-yan1 ZHU Fu-chen2.
Quantum Key Distribution and Secret Sharing via W states
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(3): 40-43.
|