2020
DOI: 10.1007/s10773-020-04494-1
|View full text |Cite
|
Sign up to set email alerts
|

Multi-secret Sharing Model based on Hermite Interpolation Polynomial and Quantum Graph State

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…Network Layer [37], [38], [47], [39]- [46] 4 Data Layer [48], [49], [58]- [65], [50] Quantum Properties [18], [21], [89], [26], [28], [31], [41], [44], [46], [70], [88] 2 Hash Based Signature [24], [25], [50], [56], [58], [59], [71] 3 Code-Based Cryptography [22] 4 Lattice Based Cryptography [20], [23], [53], [54], [57], [62], [63], [90], [38]- [40], [43], [45], [49], [51], [52] 5 Multivariate Cryptography [37], [55], [64] 6 Directed Acyclic Graph [66], [67] 7 Quantum Blind Signature…”
Section: Data Extractionmentioning
confidence: 99%
“…Network Layer [37], [38], [47], [39]- [46] 4 Data Layer [48], [49], [58]- [65], [50] Quantum Properties [18], [21], [89], [26], [28], [31], [41], [44], [46], [70], [88] 2 Hash Based Signature [24], [25], [50], [56], [58], [59], [71] 3 Code-Based Cryptography [22] 4 Lattice Based Cryptography [20], [23], [53], [54], [57], [62], [63], [90], [38]- [40], [43], [45], [49], [51], [52] 5 Multivariate Cryptography [37], [55], [64] 6 Directed Acyclic Graph [66], [67] 7 Quantum Blind Signature…”
Section: Data Extractionmentioning
confidence: 99%