×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [12]
内容类型
期刊论文 [10]
会议论文 [2]
发表日期
2015 [1]
2012 [2]
2011 [1]
2008 [2]
2007 [2]
2006 [4]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Practical (fully) distributed signatures provably secure in the standard model
期刊论文
THEORETICAL COMPUTER SCIENCE, 2015, 卷号: 595, 页码: 143-158
作者:
Wang, Yujue
;
Wong, Duncan S.
;
Wu, Qianhong
;
Chow, Sherman S. M.
;
Qin, Bo
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/17
Distributed signature
Threshold signature
Secret sharing
Verifiable
secret sharing
Monotone span program
Multipartite access structure
Standard model
A Finite Equivalence of Verifiable Multi-secret Sharing
期刊论文
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 卷号: 5, 期号: 1, 页码: 1-12
作者:
Zhao, Hui
;
Li, Mingchu
;
Sakurai, Kouichi
;
Ren, Yizhi
;
Sun, Jonathan Z.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/23
Pi-calculus
Secret-sharing
Formal analysis
Protocol verifier
Research on the round complexity of vss in the information theory model
期刊论文
International Journal of Digital Content Technology and its Applications, 2012, 卷号: 6, 期号: 8, 页码: 45-53
作者:
Zhang, Bin
;
Xu, Qiuliang
;
Jiang, Han
;
Zhao, Xiufeng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
Bivariate polynomial
Round complexity
Secure multi-party computation
Verifiable secret sharing
Two protocols for member revocation in secret sharing schemes
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 卷号: 6749 LNCS, 页码: 64-70
作者:
Yu, Jia
;
Kong, Fanyu
;
Cheng, Xiangguo
;
Hao, Rong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
key revocation
publicly verifiable secret sharing
secret sharing
threshold cryptography
Publicly verifiable secret sharing member-join protocol for threshold signatures
期刊论文
Journal of Communications, 2008, 卷号: 3, 期号: 7, 页码: 36-43
作者:
Yu, Jia
;
Kong, Fanyu
;
Hao, Rong
;
Li, Xuliang
;
Li, Guowen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/26
Publicly verifiable secret sharing
Verifiable encryption
Verifiable secret redistribution
Verifiable secret sharing
Server-assisted publicly verifiable secret sharing with proactive property
期刊论文
Journal of Computational Information Systems, 2008, 卷号: 4, 期号: 6, 页码: 2933-2939
作者:
Yu, Jia
;
Hao, Rong
;
Kong, Fanyu
;
Li, Guowen
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/26
Key escrow
Proactive security
Server-assisted cryptography
Zero-knowledge proof
Publicly verifiable secret sharing with enrollment ability
会议论文
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing/3rd ACIS International Workshop on Self-Assembling Wireless Networks, JUL 30-AUG 01, 2007
作者:
Yu, Jia
;
Kong, Fanyu
;
Hao, Rong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
Publicly verifiable secret sharing with enrollment ability
会议论文
SNPD 2007: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 30 July 2007 through 1 August 2007
作者:
Yu, Jia
;
Kong, Fanyu
;
Hao, Rong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
期刊论文
上海交通大学学报:英文版, 2006, 期号: 02, 页码: 236-241
作者:
于佳[1,2]
;
孔凡玉[1]
;
李大兴[1]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/01/03
分配方法
共享技术
网络安全
技术性能
Practical member enrollment protocol for threshold schemes
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2006, 卷号: 29, 期号: SUPPL. 2, 页码: 1-3+18
作者:
Yu, Jia
;
Li, Guo-Wen
;
Hao, Rong
;
Cheng, Zhen
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/01/03
Secret redistribution
Threshold scheme
Verifiable secret sharing
©版权所有 ©2017 CSpace - Powered by
CSpace