The following publications are possibly variants of this publication:
- A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theoremZhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu. scn, 8(18):3592-3601, 2015. [doi]
- Secret Sharing with Cheaters Using Multi-Receiver AuthenticationRui Xu, Kirill Morozov, Tsuyoshi Takagi. ieicet, 100-A(1):115-125, 2017. [doi]
- An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater ResiliencyPartha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai. iacr, 2014:628, 2014. [doi]
- An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater ResiliencyPartha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai. iacr, 2014:628, 2014. [doi]
- Note on Some Recent Cheater Identifiable Secret Sharing SchemesRui Xu, Kirill Morozov, Tsuyoshi Takagi. ieicet, 98-A(8):1814-1819, 2015. [doi]
- On Cheater Identifiable Secret Sharing Schemes Secure against Rushing AdversaryRui Xu, Kirill Morozov, Tsuyoshi Takagi. IWSEC 2013: 258-271 [doi]