Follow
Samaneh Mashhadi
Samaneh Mashhadi
Verified email at iust.ac.ir - Homepage
Title
Cited by
Cited by
Year
New efficient and practical verifiable multi-secret sharing schemes
MH Dehkordi, S Mashhadi
Information Sciences 178 (9), 2262-2274, 2008
1422008
An efficient threshold verifiable multi-secret sharing
MH Dehkordi, S Mashhadi
Computer Standards & Interfaces 30 (3), 187-190, 2008
1272008
Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem
S Mashhadi, MH Dehkordi
Information Sciences 294, 31-40, 2015
572015
Secure publicly verifiable and proactive secret sharing schemes with general access structure
S Mashhadi
Information sciences 378, 99-108, 2017
392017
General secret sharing based on quantum Fourier transform
S Mashhadi
Quantum Information Processing 18 (4), 114, 2019
352019
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
MH Dehkordi, S Mashhadi
Computer Communications 31 (9), 1777-1784, 2008
312008
Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program
S Mashhadi, M Hadian Dehkordi, N Kiamari
IET Information Security 11 (6), 326-331, 2017
212017
Computationally-secure Multiple Secret Sharing: Models, Schemes, and Formal Security Analysis
S Mashhadi
The ISC International Journal of Information Security 7 (2), 91-99, 2015
202015
How to Fairly Share Multiple Secrets Stage by Stage
S Mashhadi
Wireless Personal Communications 90 (1), 93-107, 2016
172016
A proactive multi stage secret sharing scheme for any given access structure
M Hadian Dehkordi, S Mashhadi, H Oraei
Wireless Personal Communications 104, 491-503, 2019
162019
Three (t, n) - Secret image sharing schemes based on homogeneous linear recursion
S Charoghchi, S Mashhadi
Information Sciences 552, 220-243, 2021
152021
A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers.
S Mashhadi
Int. J. Netw. Secur. 15 (4), 274-279, 2013
122013
A Novel Secure Self Proxy Signature Scheme.
S Mashhadi
Int. J. Netw. Secur. 14 (1), 22-26, 2012
122012
Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification
S Mashhadi
Scientia Iranica 19 (3), 674-679, 2012
102012
Improvement of a (t, n) Threshold d− Level Quantum Secret Sharing Scheme
S Mashhadi
Journal of Applied Security Research 17 (1), 123-134, 2022
92022
Verifiable quantum secret sharing with multi access structures
S Mashahdi
Optik, 2022
72022
A CSA-secure multi-secret sharing scheme in the standard model
S Mashhadi
Journal of Applied Security Research 15 (1), 84-95, 2020
72020
Share secrets stage by stage with homogeneous linear feedback shift register in the standard model
S Mashhadi
Security and Communication Networks 9 (17), 4495-4504, 2016
72016
Non-interactive verifiable LWE-based multi secret sharing scheme
N Kiamari, M Hadian, S Mashhadi
Multimedia Tools and Applications 82 (14), 22175-22187, 2023
62023
A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem
S Mashahdi, Z Saeedi
Multimedia Tools and Applications, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20