New efficient and practical verifiable multi-secret sharing schemes MH Dehkordi, S Mashhadi Information Sciences 178 (9), 2262-2274, 2008 | 142 | 2008 |
An efficient threshold verifiable multi-secret sharing MH Dehkordi, S Mashhadi Computer Standards & Interfaces 30 (3), 187-190, 2008 | 127 | 2008 |
Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem S Mashhadi, MH Dehkordi Information Sciences 294, 31-40, 2015 | 57 | 2015 |
Secure publicly verifiable and proactive secret sharing schemes with general access structure S Mashhadi Information sciences 378, 99-108, 2017 | 39 | 2017 |
General secret sharing based on quantum Fourier transform S Mashhadi Quantum Information Processing 18 (4), 114, 2019 | 37 | 2019 |
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves MH Dehkordi, S Mashhadi Computer Communications 31 (9), 1777-1784, 2008 | 31 | 2008 |
Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program S Mashhadi, M Hadian Dehkordi, N Kiamari IET Information Security 11 (6), 326-331, 2017 | 21 | 2017 |
Computationally-secure Multiple Secret Sharing: Models, Schemes, and Formal Security Analysis S Mashhadi The ISC International Journal of Information Security 7 (2), 91-99, 2015 | 20 | 2015 |
How to Fairly Share Multiple Secrets Stage by Stage S Mashhadi Wireless Personal Communications 90 (1), 93-107, 2016 | 17 | 2016 |
A proactive multi stage secret sharing scheme for any given access structure M Hadian Dehkordi, S Mashhadi, H Oraei Wireless Personal Communications 104, 491-503, 2019 | 16 | 2019 |
Three (t, n) - Secret image sharing schemes based on homogeneous linear recursion S Charoghchi, S Mashhadi Information Sciences 552, 220-243, 2021 | 15 | 2021 |
A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers. S Mashhadi Int. J. Netw. Secur. 15 (4), 274-279, 2013 | 12 | 2013 |
A Novel Secure Self Proxy Signature Scheme. S Mashhadi Int. J. Netw. Secur. 14 (1), 22-26, 2012 | 12 | 2012 |
Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification S Mashhadi Scientia Iranica 19 (3), 674-679, 2012 | 10 | 2012 |
Improvement of a (t, n) Threshold d− Level Quantum Secret Sharing Scheme S Mashhadi Journal of Applied Security Research 17 (1), 123-134, 2022 | 9 | 2022 |
Verifiable quantum secret sharing with multi access structures S Mashahdi Optik, 2022 | 7 | 2022 |
A CSA-secure multi-secret sharing scheme in the standard model S Mashhadi Journal of Applied Security Research 15 (1), 84-95, 2020 | 7 | 2020 |
Share secrets stage by stage with homogeneous linear feedback shift register in the standard model S Mashhadi Security and Communication Networks 9 (17), 4495-4504, 2016 | 7 | 2016 |
Non-interactive verifiable LWE-based multi secret sharing scheme N Kiamari, M Hadian, S Mashhadi Multimedia Tools and Applications 82 (14), 22175-22187, 2023 | 6 | 2023 |
A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem S Mashahdi, Z Saeedi Multimedia Tools and Applications, 2023 | 6 | 2023 |