Deep search:Searching for "Secret sharing" in 'KEYWORD Got 8 items.
index Title
1Applying two channels to vector space secret sharing based multi-signature scheme
Author(s):XIAO Qing-hua, PING Ling-di, CHEN ...  Clicked:8475  Download:4046  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.1 P.56-62  DOI:10.1631/jzus.2005.A0056
2On ASGS framework: general requirements and an example of implementation
Author(s):KULESZA Kamil, KOTULSKI Zbigniew  Clicked:7528  Download:3978  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.4 P.511-521  DOI:10.1631/jzus.2007.A0511
3CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang,...  Clicked:10249  Download:4352  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
4A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-x...  Clicked:9968  Download:3720  Cited:0  <Full Text>  <PPT> 2457
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
5Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:8806  Download:13658  Cited:0  <Full Text>  <PPT> 1300
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
6Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ...  Clicked:4335  Download:16140  Cited:0  <Full Text>  <PPT> 1222
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
7Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using...
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YA...  Clicked:3360  Download:2300  Cited:0  <Full Text>  <PPT> 688
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1250-1265  DOI:10.1631/FITEE.2300750
8Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHA...  Clicked:1823  Download:3350  Cited:0  <Full Text>  <PPT> 391
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE