Verifiable threshold quantum secret sharing with sequential communication C Lu, F Miao, J Hou, K Meng Quantum Information Processing 17, 1-13, 2018 | 30 | 2018 |
Constructing ideal secret sharing schemes based on Chinese remainder theorem Y Ning, F Miao, W Huang, K Meng, Y Xiong, X Wang International Conference on the Theory and Application of Cryptology and …, 2018 | 28 | 2018 |
Threshold changeable secret sharing with secure secret reconstruction K Meng, F Miao, W Huang, Y Xiong Information Processing Letters 157, 105928, 2020 | 27 | 2020 |
Threshold quantum secret sharing based on single qubit C Lu, F Miao, K Meng, Y Yu Quantum Information Processing 17, 1-13, 2018 | 26 | 2018 |
A reversible extended secret image sharing scheme based on Chinese remainder theorem K Meng, F Miao, Y Xiong, CC Chang Signal Processing: Image Communication 95, 116221, 2021 | 25 | 2021 |
Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem K Meng, F Miao, W Huang, Y Xiong Discrete Applied Mathematics 268, 152-163, 2019 | 15 | 2019 |
A proactive secret sharing scheme based on Chinese remainder theorem K Meng, F Miao, Y Ning, W Huang, Y Xiong, CC Chang Frontiers of Computer Science 15, 1-10, 2021 | 13 | 2021 |
A secure and efficient on-line/off-line group key distribution protocol K Meng, F Miao, Y Yu Designs, Codes and Cryptography 87, 1601-1620, 2019 | 7 | 2019 |
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor L Wu, F Miao, K Meng, X Wang Frontiers of Computer Science 16, 1-9, 2022 | 6 | 2022 |
A universal secret sharing scheme with general access structure based on CRT K Meng, F Miao, Y Yu, C Lu 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 5 | 2018 |
Grouped secret sharing schemes based on lagrange interpolation polynomials and chinese remainder theorem F Miao, Y Yu, K Meng, Y Xiong, CC Chang Security and Communication Networks 2021 (1), 6678345, 2021 | 4 | 2021 |
A novel and secure secret sharing algorithm applied to insecure networks K Meng Wireless Personal Communications 115 (2), 1635-1650, 2020 | 2 | 2020 |
Realize general access structure based on single share Y Xie, SA Khuhro, F Miao, K Meng 2017 International Conference on Computer Technology, Electronics and …, 2017 | 2 | 2017 |
Threshold Changeable Secret Sharing Scheme and Its Application to Group Authentication F Miao, Y Yu, K Meng, W Huang, Y Xiong arXiv preprint arXiv:1908.02110, 2019 | | 2019 |
Ideal Tightly Couple (t, m, n) Secret Sharing F Miao, K Meng, W Huang, Y Xiong, X Wang arXiv e-prints, arXiv: 1905.02004, 2019 | | 2019 |
Correction to: Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem Y Ning, F Miao, W Huang, K Meng, Y Xiong, X Wang Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | | 2018 |
Tightly Coupled Secret Sharing and Its Application to Group Authentication F Miao, K Meng, Y Yu, W Huang, Y Xiong, X Wang | | 2017 |