How to share a secret with cheaters
- 1 October 1989
- journal article
- Published by Springer Nature in Journal of Cryptology
- Vol. 1 (3), 133-138
- https://doi.org/10.1007/bf02252871
Abstract
No abstract availableThis publication has 6 references indexed in Scilit:
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Recognizing primes in random polynomial timePublished by Association for Computing Machinery (ACM) ,1987
- Verifiable secret sharing and achieving simultaneity in the presence of faultsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- A "Paradoxical" Solution To The Signature ProblemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Randomized byzantine generalsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983
- How to share a secretCommunications of the ACM, 1979