Deep search:Searching for "Secret sharing" in 'KEYWORD Got 8 items.
index Title
1Applying two channels to vector space secret sharing based multi-signature scheme
Author(s):XIAO Qing-hua, PING Ling-di, CHEN ...  Clicked:7124  Download:3201  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.1 P.56-62  DOI:10.1631/jzus.2005.A0056
2On ASGS framework: general requirements and an example of implementation
Author(s):KULESZA Kamil, KOTULSKI Zbigniew  Clicked:6400  Download:3517  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.4 P.511-521  DOI:10.1631/jzus.2007.A0511
3CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,...  Clicked:9028  Download:3753  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
4A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-x...  Clicked:8468  Download:2431  Cited:0  <Full Text>  <PPT> 1879
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
5Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:7392  Download:10751  Cited:0  <Full Text>  <PPT> 816
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
6Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ...  Clicked:2884  Download:11809  Cited:0  <Full Text>  <PPT> 661
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
7Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using...
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YA...  Clicked:1745  Download:1036  Cited:0  <Full Text>  <PPT> 201
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1250-1265  DOI:10.1631/FITEE.2300750
8Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHA...  Clicked:296  Download:223  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  1998 Vol.-1 No.-1 P.  DOI:10.1631/FITEE.2400371
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE