[1] |
SHEN Hua, CHEN Mi-wen, ZHANG Ming-wu.
Leakage-Resilient Verifiable Multi-Secret Sharing Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 87-91.
|
[2] |
CHANG Li-wei, ZHENG Shi-hui, XING You-song, JIN Lei, YANG Yi-xian.
Verifiable Multi-Use Dynamic Threshold Large Secret Sharing Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 86-90.
|
[3] |
HUANG Hai-ping, WU Wan-feng, WANG Ru-chuan, LI Ling-juan.
Security Improvements for Secure Routing Protocol SEAD Using Re-generative Hash Key Chain
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(4): 99-103.
|
[4] |
.
A Verifiable MultiPolicy Secret Sharing Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(6): 72-75.
|
[5] |
YU Jia1,HAO Rong1,2,KONG Fan-yu2, LI Xu-liang1,2 .
Proactive and Publicly Verifiable Server-Assisted Secret Sharing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(5): 13-17.
|
[6] |
LIN Song1,2, QIN Su-juan1, CHEN Xiu-bo1, WEN Qiao-yan1, ZHU Fu-chen3.
A (n-1, n) Threshold Quantum Secret Sharing Scheme Based on Entanglement Swapping
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 26-29.
|
[7] |
SUN Ying1, QIN Su-juan1, WEN Qiao-yan1, ZHU Fu-chen2.
利用GHZ态实现可控的量子秘密共享
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(1): 9-13.
|
[8] |
ZHANG Yan-Shuo 1,2, LIU Zhuo-Jun2.
Dynamic Generalized Threshold Multi-Secret Sharing Scheme among Weighted Participants
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(1): 130-134.
|
[9] |
ZHANG Jie1 , LIU Zhen-hua2 , WEN Qiao-yan1.
Strictly - Cheating Immune Secret Sharing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(2): 24-27.
|
[10] |
TONG Xin1, WEN Qiao-yan1, ZHU Fu-chen2.
Quantum Secret Sharing Based on GHZ States Entanglement Swapping
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(1): 44-48.
|
[11] |
YU Jia1, LI Guo-wen2, HAO Rong1,2, CHENG Zhen3.
A Practical Member Enrollment Protocol for Threshold Schemes
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(s2): 1-3.
|
[12] |
YU Jia1; HAO Rong1,2; ZHAO Zhi-gang1; LI DA-xing2 .
A Forward-Secure Proactive Threshold Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(s2): 24-29.
|
[13] |
ZHANG Wen-ying1,WU Chuan-kun1,LEI Hong2.
A New Cheating Immune Secret Sharing Function
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(4): 54-56.
|
[14] |
YANG Yu-guang1 WEN Qiao-yan1 ZHU Fu-chen2.
Quantum Key Distribution and Secret Sharing via W states
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(3): 40-43.
|
[15] |
QIN Su-juan, WEN Qiao-yan, ZHU Fu-chen.
A Ring Quantum Secret Sharing Protocol Based on Entanglement Swapping of Bell States
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(2): 34-37.
|