Security analysis and improvement of two verifiable multi-secret sharing schemes

Jia Yu, Rong Hao, Xiangguo Cheng. Security analysis and improvement of two verifiable multi-secret sharing schemes. IJSN, 8(4):200-206, 2013. [doi]

Authors

Jia Yu

This author has not been identified. Look up 'Jia Yu' in Google

Rong Hao

This author has not been identified. Look up 'Rong Hao' in Google

Xiangguo Cheng

This author has not been identified. Look up 'Xiangguo Cheng' in Google