Deep search:Searching for "secret sharing" in 'ABSTRACTGot 8 items.
index Title
1Applying two channels to vector space secret sharing based multi-signature scheme
Author(s):XIAO Qing-hua, PING Ling-di, CHEN ...  Clicked:7765  Download:3796  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.1 P.56-62  DOI:10.1631/jzus.2005.A0056
2On ASGS framework: general requirements and an example of implementation
Author(s):KULESZA Kamil, KOTULSKI Zbigniew  Clicked:7279  Download:3847  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.4 P.511-521  DOI:10.1631/jzus.2007.A0511
3CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,...  Clicked:9883  Download:4147  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
4A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-x...  Clicked:9476  Download:3217  Cited:0  <Full Text>  <PPT> 2305
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
5Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:8450  Download:12877  Cited:0  <Full Text>  <PPT> 1191
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
6Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ...  Clicked:3848  Download:15154  Cited:0  <Full Text>  <PPT> 1124
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
7Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using...
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YA...  Clicked:2836  Download:1795  Cited:0  <Full Text>  <PPT> 506
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1250-1265  DOI:10.1631/FITEE.2300750
8Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHA...  Clicked:1303  Download:2260  Cited:0  <Full Text>  <PPT> 118
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE