[1] |
Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU.
Digital rights management scheme based on secret sharing in blockchain environment
[J]. Journal of Computer Applications, 2021, 41(11): 3257-3265.
|
[2] |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei.
Auditable signature scheme for blockchain based on secure multi-party
[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645.
|
[3] |
ZHANG Guochao, WANG Ruijin.
Blockchain shard storage model based on threshold secret sharing
[J]. Journal of Computer Applications, 2019, 39(9): 2617-2622.
|
[4] |
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng.
Threshold signature scheme suitable for blockchain electronic voting scenes
[J]. Journal of Computer Applications, 2019, 39(9): 2629-2635.
|
[5] |
LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an.
A private set intersection protocol against malicious attack
[J]. Journal of Computer Applications, 2017, 37(6): 1593-1598.
|
[6] |
YUAN Dazeng, HE Mingxing, LI Xiao, ZENG Shengke.
Private information retrieval protocol based on point function secret sharing
[J]. Journal of Computer Applications, 2017, 37(2): 494-498.
|
[7] |
XU Xiaojie, WANG Lisheng.
Birkhoff interpolation-based verifiable hierarchical threshold secret sharing algorithm
[J]. Journal of Computer Applications, 2016, 36(4): 952-955.
|
[8] |
WEN Liang, JIANG Wei, PAN Xiong, ZHOU Keran, DONG Qi, WANG Junlong.
Optimization design of preventing fault injection attack on distributed embedded systems
[J]. Journal of Computer Applications, 2016, 36(2): 495-498.
|
[9] |
LUO Xiaoshuang, YANG Xiaoyuan, WANG Xu'an.
Privacy preserving interest matching scheme for social network
[J]. Journal of Computer Applications, 2016, 36(12): 3322-3327.
|
[10] |
XIANG Wen, YANG Xiaoyuan, WU Liqiang.
Revocable fuzzy identity based encryption scheme over ideal lattice
[J]. Journal of Computer Applications, 2016, 36(10): 2733-2737.
|
[11] |
YUAN Qizhao, CAI Hongliang, ZHANG Jingzhong, XIA Hangyu.
Secret sharing scheme only needing XOR operations
[J]. Journal of Computer Applications, 2015, 35(7): 1877-1881.
|
[12] |
WU Junqin, LIN Huiying.
Quantum secret sharing of arbitrary N-qubit via entangled state
[J]. Journal of Computer Applications, 2015, 35(2): 397-400.
|
[13] |
YIN Kaize, WANG Haihang.
Cloud storage system with fine-grained access control and low storage space overhead
[J]. Journal of Computer Applications, 2015, 35(12): 3413-3418.
|
[14] |
LAN G Xun WEI Lixian WANG Xuan WU Xuguang.
Cryptographic access control scheme for cloud storage based on proxy re-encryption
[J]. Journal of Computer Applications, 2014, 34(3): 724-727.
|
[15] |
XU Jun.
About the secret sharing scheme applied in the Pi calculus
[J]. Journal of Computer Applications, 2013, 33(11): 3247-3251.
|