-
1
-
-
85028925878
-
Proof verification and hardness of approximation problems
-
Arora, S., Lund, C., Motwani, R., Sudan, M., and Szegedy, M. (1992), Proof verification and hardness of approximation problems, in "Proceedings of the 33rd Symposium on Foundations of Computer Science," pp. 14-23.
-
(1992)
Proceedings of the 33rd Symposium on Foundations of Computer Science
, pp. 14-23
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
2
-
-
0029519801
-
Free bits, PCPs and non-approximability - Towards tight results
-
Bellare, M., Goldreich, O., and Sudan, M. (1995), Free bits, PCPs and non-approximability -Towards tight results, in "Proceedings of the 36th IEEE Symposium on Foundations of Computer Science," pp. 422-431.
-
(1995)
Proceedings of the 36th IEEE Symposium on Foundations of Computer Science
, pp. 422-431
-
-
Bellare, M.1
Goldreich, O.2
Sudan, M.3
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988), Completeness theorems for non-cryptographic fault-tolerant distributed computation, in "Proceedings of the 20th Annual ACM Symposium on Theory of Computing," pp. 1-10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Proceedings of Eurocrypt 84, Advances in Cryptology Springer-Verlag, Berlin/New York
-
Blom, R. (1984), An optimal class of symmetric key generation systems, in "Proceedings of Eurocrypt 84, Advances in Cryptology," Lecture Notes in Computer Science, Vol. 209, pp. 335-338, Springer-Verlag, Berlin/New York.
-
(1984)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
7
-
-
84961369151
-
Security of ramp schemes
-
Proceedings of Crypto '84, Advances in Cryptology Springer-Verlag, Berlin/New York
-
Blakley, G. R., and Meadows, C. (1985), Security of ramp schemes, in "Proceedings of Crypto '84, Advances in Cryptology," Lecture Notes in Computer Science, Vol. 196, pp. 411-431, Springer-Verlag, Berlin/New York.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 411-431
-
-
Blakley, G.R.1
Meadows, C.2
-
8
-
-
0030569864
-
On the information rate of secret sharing schemes
-
Blundo, C., De Santis, A., Gargano, L., and Vaccaro, U. (1996), On the information rate of secret sharing schemes, Theoret. Comput. Sci. 154, 283-306. A preliminary version appeared in "Proceedings of Crypto 92, Advances in Cryptology," Lecture Notes in Computer Science, Vol. 740, pp. 149-169, Springer-Verlag, Berlin/New York, 1993.
-
(1996)
Theoret. Comput. Sci.
, vol.154
, pp. 283-306
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
9
-
-
0346351901
-
Proceedings of Crypto 92, Advances in Cryptology
-
Springer-Verlag, Berlin/New York
-
Blundo, C., De Santis, A., Gargano, L., and Vaccaro, U. (1996), On the information rate of secret sharing schemes, Theoret. Comput. Sci. 154, 283-306. A preliminary version appeared in "Proceedings of Crypto 92, Advances in Cryptology," Lecture Notes in Computer Science, Vol. 740, pp. 149-169, Springer-Verlag, Berlin/New York, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 149-169
-
-
-
10
-
-
85028765277
-
Perfectly secure key distrubution for dynamic conferences
-
Proceedings of Crypto 92, Advances in Cryptology Springer-Verlag, Berlin/ New York
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., and Yung, M. (1993), Perfectly secure key distrubution for dynamic conferences, in "Proceedings of Crypto 92, Advances in Cryptology," Lecture Notes in Computer Science, Vol. 740, pp. 478-493, Springer-Verlag, Berlin/ New York.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 478-493
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
11
-
-
0029631974
-
Graph decomposition and secret sharing schemes
-
Blundo, C., De Santis, A., Stinson, D. R., and Vaccaro, U. (1995), Graph decomposition and secret sharing schemes, J. Cryptol. 8, 39-64. A preliminary version appeared in "Advances in Cryptology- Eurocrypt '92," Lecture Notes in Computer Science, Vol. 658, pp. 1-24, Springer-Verlag, Berlin/ New York, 1993.
-
(1995)
J. Cryptol.
, vol.8
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
12
-
-
0029631974
-
Advances in Cryptology-Eurocrypt '92
-
Springer-Verlag, Berlin/ New York
-
Blundo, C., De Santis, A., Stinson, D. R., and Vaccaro, U. (1995), Graph decomposition and secret sharing schemes, J. Cryptol. 8, 39-64. A preliminary version appeared in "Advances in Cryptology-Eurocrypt '92," Lecture Notes in Computer Science, Vol. 658, pp. 1-24, Springer-Verlag, Berlin/ New York, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.658
, pp. 1-24
-
-
-
13
-
-
85027395928
-
Randomness in distribution protocols
-
21st International Colloquium on Automata, Languages and Programming (ICALP '94) Springer-Verlag, Berlin/New York
-
Blundo, C., De Santis, A., and Vaccaro, U. (1994), Randomness in distribution protocols, in "21st International Colloquium on Automata, Languages and Programming (ICALP '94)," Lecture Notes in Computer Science, Vol. 820, pp. 568-579, Springer-Verlag, Berlin/New York.
-
(1994)
Lecture Notes in Computer Science
, vol.820
, pp. 568-579
-
-
Blundo, C.1
De Santis, A.2
Vaccaro, U.3
-
14
-
-
0346981792
-
-
Technical Report, University of Salerno
-
Blundo, C., De Santis, A., and Vaccaro, U. (1995), "On Secret Sharing Schemes," Technical Report, University of Salerno.
-
(1995)
On Secret Sharing Schemes
-
-
Blundo, C.1
De Santis, A.2
Vaccaro, U.3
-
15
-
-
33749269532
-
Efficient sharing of many secrets
-
Proceedings of STACS '93 Springer-Verlag, Berlin/ New York
-
Blundo, C., De Santis, A., and Vaccaro, U. (1993), Efficient sharing of many secrets, in "Proceedings of STACS '93," Lecture Notes in Computer Science, Vol. 665, pp. 692-703, Springer-Verlag, Berlin/ New York.
-
(1993)
Lecture Notes in Computer Science
, vol.665
, pp. 692-703
-
-
Blundo, C.1
De Santis, A.2
Vaccaro, U.3
-
16
-
-
84948947435
-
On the dealer's randomness required in secret sharing schemes
-
to appear
-
Blundo, C., Giorgio Gaggia A., and Stinson, D. R. (1995), On the dealer's randomness required in secret sharing schemes, Design Codes Cryptography, to appear. A preliminary version appeared in "Advances in Cryptology - EUROCRYPT '94," Lecture Notes in Computer Science, Vol. 950, pp. 35-46, Springer-Verlag, Berlin/New York.
-
(1995)
Design Codes Cryptography
-
-
Blundo, C.1
Giorgio Gaggia, A.2
Stinson, D.R.3
-
17
-
-
84948947435
-
Advances in Cryptology - EUROCRYPT '94
-
Springer-Verlag, Berlin/New York
-
Blundo, C., Giorgio Gaggia A., and Stinson, D. R. (1995), On the dealer's randomness required in secret sharing schemes, Design Codes Cryptography, to appear. A preliminary version appeared in "Advances in Cryptology - EUROCRYPT '94," Lecture Notes in Computer Science, Vol. 950, pp. 35-46, Springer-Verlag, Berlin/New York.
-
Lecture Notes in Computer Science
, vol.950
, pp. 35-46
-
-
-
18
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
Brickell, E. F., and Davenport, D. M. (1991), On the classification of ideal secret sharing schemes, J. Cryptol. 4, 123-124.
-
(1991)
J. Cryptol.
, vol.4
, pp. 123-124
-
-
Brickell, E.F.1
Davenport, D.M.2
-
19
-
-
0026992660
-
Improved bounds on the information rate of perfect secret sharing schemes
-
Brickell, E. F., and Stinson, D. R. (1992), Improved bounds on the information rate of perfect secret sharing schemes, J. Cryptol. 5, 153-166.
-
(1992)
J. Cryptol.
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
20
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
Capocelli, R. M., De Santis, A., Gargano, L., and Vaccaro, U. (1993), On the size of shares for secret sharing schemes, J. Cryptol. 6, 157-169.
-
(1993)
J. Cryptol.
, vol.6
, pp. 157-169
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
21
-
-
85028775273
-
Size of shares and probability of cheating in threshold schemes
-
Advances in Cryptology - EUROCRYPT '93 Springer-Verlag, Berlin/New York
-
Carpentieri, M., De Santis, A., and Vaccaro, U. (1994), Size of shares and probability of cheating in threshold schemes, in "Advances in Cryptology - EUROCRYPT '93," Lecture Notes in Computer Science, Vol. 765, pp. 118-125, Springer-Verlag, Berlin/New York.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 118-125
-
-
Carpentieri, M.1
De Santis, A.2
Vaccaro, U.3
-
25
-
-
0023545076
-
How to play any mental game
-
Goldreich, O., Micali, S., and Wigderson, A. (1987), How to play any mental game, in "Proceedings of the 19th Annual ACM Symposium on Theory of Computing," pp. 218-229.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
26
-
-
0025212474
-
A matrix key-distribution scheme
-
Gong, L., and Wheeler, D. J. (1990), A matrix key-distribution scheme, J. Cryptol. 2, 51-59.
-
(1990)
J. Cryptol.
, vol.2
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
29
-
-
0020543282
-
On secret sharing systems
-
Karnin, E. D., Greene, J. W., and Hellman, M. E. (1983), On secret sharing systems, IEEE Trans. Inform. Theory 29, 35-41.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
30
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
Knuth, D. E. (1968), "The Art of Computer Programming, Fundamental Algorithms," Addison-Wesley, Reading, MA.
-
(1968)
The Art of Computer Programming, Fundamental Algorithms
-
-
Knuth, D.E.1
-
31
-
-
0002918554
-
The complexity of nonuniform random number generations
-
Academic Press, San Diego
-
Knuth, D. E., and Yao, A. C. (1976), The complexity of nonuniform random number generations, in "Algorithms and Complexity," pp. 357-428, Academic Press, San Diego.
-
(1976)
Algorithms and Complexity
, pp. 357-428
-
-
Knuth, D.E.1
Yao, A.C.2
-
32
-
-
84894203891
-
A time-randomness tradeoff for oblivious routing
-
Krizanc, D., Peleg, D., and Upfal, E. (1988), A time-randomness tradeoff for oblivious routing, in "Proceedings of the 20th Annual ACM Symposium on Theory of Computing," pp. 93-102.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 93-102
-
-
Krizanc, D.1
Peleg, D.2
Upfal, E.3
-
33
-
-
84989455644
-
On the key predistribution system: A practical solution to the key distribution problem
-
Advances in Cryptology: Proceedings of Crypto 87 Springer-Verlag, Berlin/New York
-
Matsumoto, T., and Imai, H. (1987), On the key predistribution system: A practical solution to the key distribution problem, in "Advances in Cryptology: Proceedings of Crypto 87," Lecture Notes in Computer Science, Vol. 239, pp. 185-193, Springer-Verlag, Berlin/New York.
-
(1987)
Lecture Notes in Computer Science
, vol.239
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
34
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
McEliece, R. J., and Sarwate, D. (1981), On sharing secrets and Reed-Solomon codes, Comm. ACM 24, 583-584.
-
(1981)
Comm. ACM
, vol.24
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.2
-
35
-
-
0024735966
-
Holographical dispersal and recovery of information
-
Preparata, F. P. (1989), Holographical dispersal and recovery of information, IEEE Trans. Inform. Theory 35, 1123-1124.
-
(1989)
IEEE Trans. Inform. Theory
, vol.35
, pp. 1123-1124
-
-
Preparata, F.P.1
-
36
-
-
0024641589
-
Efficient dispersal of information for security, load balancing and fault tolerance
-
Rabin, M. O. (1989), Efficient dispersal of information for security, load balancing and fault tolerance, J. Assoc. Comput. Mach. 36, 335-348.
-
(1989)
J. Assoc. Comput. Mach.
, vol.36
, pp. 335-348
-
-
Rabin, M.O.1
-
37
-
-
0002993923
-
The information dispersal algorithm and its applications
-
Springer-Verlag, Berlin/ New York
-
Rabin, M. O. (1990), The information dispersal algorithm and its applications, in "Sequences: Combinatorics, Compression, Security and Transmission," pp. 406-419, Springer-Verlag, Berlin/ New York.
-
(1990)
Sequences: Combinatorics, Compression, Security and Transmission
, pp. 406-419
-
-
Rabin, M.O.1
-
38
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979), How to share a secret, Comm. ACM 22, 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
39
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
IEEE Press, New York
-
Simmons, G. J. (1991), An introduction to shared secret and/or shared control schemes and their application, "Contemporary Cryptology," pp. 441-497, IEEE Press, New York.
-
(1991)
Contemporary Cryptology
, pp. 441-497
-
-
Simmons, G.J.1
-
40
-
-
0000708528
-
An explication of secret sharing schemes
-
Stinson, D. R. (1992), An explication of secret sharing schemes, Design Codes Cryptogr. 2, 357-390.
-
(1992)
Design Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
41
-
-
0028323999
-
Decomposition constructions for secret sharing schemes
-
Stinson, D. R. (1994), Decomposition constructions for secret sharing schemes, IEEE Trans. Inform. Theory 40, 118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
-
42
-
-
0024141971
-
How to share a secret with cheaters
-
Tompa, M., and Woll, H. (1988), How to share a secret with cheaters, J. Cryptol. 1, 133-139.
-
(1988)
J. Cryptol.
, vol.1
, pp. 133-139
-
-
Tompa, M.1
Woll, H.2
|