Deep search:Searching for "secret sharing" in 'ABSTRACTGot 8 items.
index Title
1Applying two channels to vector space secret sharing based multi-signature scheme
Author(s):XIAO Qing-hua, PING Ling-di, CHEN ...  Clicked:7097  Download:3167  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.1 P.56-62  DOI:10.1631/jzus.2005.A0056
2On ASGS framework: general requirements and an example of implementation
Author(s):KULESZA Kamil, KOTULSKI Zbigniew  Clicked:6384  Download:3510  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.4 P.511-521  DOI:10.1631/jzus.2007.A0511
3CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,...  Clicked:8988  Download:3737  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
4A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-x...  Clicked:8420  Download:2425  Cited:0  <Full Text>  <PPT> 1871
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
5Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:7349  Download:10711  Cited:0  <Full Text>  <PPT> 804
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
6Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ...  Clicked:2816  Download:11727  Cited:0  <Full Text>  <PPT> 636
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
7Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using...
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YA...  Clicked:1690  Download:1013  Cited:0  <Full Text>  <PPT> 189
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1250-1265  DOI:10.1631/FITEE.2300750
8Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHA...  Clicked:272  Download:171  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  1998 Vol.-1 No.-1 P.  DOI:10.1631/FITEE.2400371
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE