-
1
-
-
0041089975
-
On hiding information from an oracle
-
M. ABADI, J. FEIGENBAUM, AND J. KILIAN, On hiding information from an oracle, J. Comput. System Sci., 39 (1989), pp. 21-50.
-
(1989)
J. Comput. System Sci.
, vol.39
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
3
-
-
33745511846
-
Hiding instances in multioracle queries
-
STACS '90, Proceedings of the 7th Annual Symposium on Theoretical Aspects of Computer Science, C. Choffrut and T. Lengauer, eds., Springer-Verlag, New York
-
D. BEAVER AND J. FEIGENBAUM, Hiding instances in multioracle queries, in STACS '90, Proceedings of the 7th Annual Symposium on Theoretical Aspects of Computer Science, C. Choffrut and T. Lengauer, eds., Lecture Notes in Comput. Sci. 415, Springer-Verlag, New York, 1990, pp. 37-48.
-
(1990)
Lecture Notes in Comput. Sci.
, vol.415
, pp. 37-48
-
-
Beaver, D.1
Feigenbaum, J.2
-
4
-
-
0028429265
-
Universally ideal secret sharing schemes
-
A. BEIMEL AND B. CHOR, Universally ideal secret sharing schemes. IEEE Trans. Inform. Theory, 40 (1994), pp. 786-794.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 786-794
-
-
Beimel, A.1
Chor, B.2
-
5
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
ACM, New York
-
M. BEN-OR, S. GOLDWASSER, AND A. WIGDERSON, Completeness theorems for noncryptographic fault-tolerant distributed computations, in Proceedings of the 20th Annual ACM Symposium on the Theory of Computing, ACM, New York, 1988, pp. 1-10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret
-
Advances in Cryptoiogy - CRYPTO '86, A. M. Odlyzko, ed., Springer-Verlag, New York
-
J. BENALOH. Secret sharing homomorphisms: Keeping shares of a secret secret, in Advances in Cryptoiogy - CRYPTO '86, A. M. Odlyzko, ed., Lecture Notes in Computer Sci. 263, Springer-Verlag, New York, 1987, pp. 251-260.
-
(1987)
Lecture Notes in Computer Sci.
, vol.263
, pp. 251-260
-
-
Benaloh, J.1
-
7
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
Advances in Cryptoiogy - CRYPTO '88, S. Goldwasser, ed., Springer-Verlag, New York
-
J. BENALOH AND J. LEICHTER, Generalized secret sharing and monotone functions, in Advances in Cryptoiogy - CRYPTO '88, S. Goldwasser, ed., Lecture Notes in Comput. Sci. 403, Springer-Verlag, New York, 1990, pp. 27-35.
-
(1990)
Lecture Notes in Comput. Sci.
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
8
-
-
85062838317
-
Safeguarding cryptographic keys
-
Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, AFIPS Press, Montvale, NJ
-
G. R. BLAKLEY, Safeguarding cryptographic keys, in Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, AFIPS Conference Proceedings 48, AFIPS Press, Montvale, NJ, 1979, pp. 313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
9
-
-
84961369151
-
The security of ramp schemes
-
Advances in Cryptology - CRYPTO '84, G. R. Blakley and D. Chaum, eds., Springer-Verlag, New York
-
G. R. BLAKLEY AND C. MEADOWS, The security of ramp schemes, in Advances in Cryptology - CRYPTO '84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Comput. Sci. 196, Springer-Verlag, New York, 1985, pp. 242-268.
-
(1985)
Lecture Notes in Comput. Sci.
, vol.196
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
10
-
-
85005949623
-
Multisecret sharing schemes
-
Advances in Cryptology - CRYPTO '94, Y. Desmedt, ed., Springer-Verlag, New York
-
C. BLUNDO, A. DE SANTIS, G. DI CRESCENZO, A. GIORGIO GAGGIA, AND U. VACCARO, Multisecret sharing schemes, in Advances in Cryptology - CRYPTO '94, Y. Desmedt, ed., Lecture Notes in Comput. Sci. 839, Springer-Verlag, New York, 1994, pp. 150-163.
-
(1994)
Lecture Notes in Comput. Sci.
, vol.839
, pp. 150-163
-
-
Blundo, C.1
De Santis, A.2
Di Crescenzo, G.3
Giorgio Gaggia, A.4
Vaccaro, U.5
-
11
-
-
33749269532
-
Efficient sharing of many secrets
-
STACS '93, P. Enjalbert, A. Finkel, and K. W. Wagner, eds., Springer-Verlag, New York
-
C. BLUNDO, A. DE SANTIS, AND U. VACCARO, Efficient sharing of many secrets, in STACS '93, P. Enjalbert, A. Finkel, and K. W. Wagner, eds., Lecture Notes in Comput. Sci. 665, Springer-Verlag, New York, 1993, pp. 692-703.
-
(1993)
Lecture Notes in Comput. Sci.
, vol.665
, pp. 692-703
-
-
Blundo, C.1
De Santis, A.2
Vaccaro, U.3
-
13
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. BRICKELL AND D. M. DAVENPORT, On the classification of ideal secret sharing schemes, J. Cryptology, 4 (1991), pp. 123-134.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
14
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. F. BRICKELL AND D. R. STINSON, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, 5 (1992), pp. 153-166.
-
(1992)
J. Cryptology
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
15
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM, New York
-
D. CHAUM, C. CRÉPEAU, AND I. DAMGARD, Multiparty unconditionally secure protocols, in Proceedings of the 20th Annual ACM Symposium on the Theory of Computing, ACM, New York, 1988, pp. 11-19.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
17
-
-
0027961556
-
How to share a function securely
-
ACM, New York
-
A. DE SANTIS, Y DESMEDT, Y. FRANKEL, AND M. YUNG, How to share a function securely, in Proceedings of the 26th Annual ACM Symposium on the Theory of Computing, ACM, New York, 1994, pp. 522-533.
-
(1994)
Proceedings of the 26th Annual ACM Symposium on the Theory of Computing
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
18
-
-
84985822377
-
Threshold cryptosystems
-
Advances in Cryptology - AUSCRYPT '92, J. Seberry and Y. Zheng, eds., Springer-Verlag, New York
-
Y. DESMEDT, Threshold cryptosystems, in Advances in Cryptology - AUSCRYPT '92, J. Seberry and Y. Zheng, eds., Lecture Notes in Comput. Sci. 718, Springer-Verlag, New York, 1993, pp. 5-14.
-
(1993)
Lecture Notes in Comput. Sci.
, vol.718
, pp. 5-14
-
-
Desmedt, Y.1
-
19
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Advances in Cryptology - CRYPTO '91, J. Feigenbaum, ed., Springer-Verlag, New York
-
Y. DESMEDT AND Y. FRANKEL, Shared generation of authenticators and signatures, in Advances in Cryptology - CRYPTO '91, J. Feigenbaum, ed., Lecture Notes in Comput. Sci. 576, Springer-Verlag, New York, 1992, pp. 457-469.
-
(1992)
Lecture Notes in Comput. Sci.
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
20
-
-
0000527282
-
Homomorphic zero-knowledge threshold schemes over any finite abelian group
-
Y G. DESMEDT AND Y. FRANKEL, Homomorphic zero-knowledge threshold schemes over any finite abelian group, SIAM J. Discrete Math., 7 (1994), pp. 667-679.
-
(1994)
SIAM J. Discrete Math.
, vol.7
, pp. 667-679
-
-
Desmedt, Y.G.1
Frankel, Y.2
-
21
-
-
0026985378
-
Communication complexity of secure computation
-
ACM, New York
-
M. K. FRANKLIN AND M. YUNG, Communication complexity of secure computation, in Proceedings of the 24th Annual ACM Symposium on the Theory of Computing, ACM, New York, 1992, pp. 699-710.
-
(1992)
Proceedings of the 24th Annual ACM Symposium on the Theory of Computing
, pp. 699-710
-
-
Franklin, M.K.1
Yung, M.2
-
22
-
-
0023543848
-
Secret sharing schemes realizing general access structure
-
IEEE Press, Piscataway, NJ
-
M. ITO, A. SAITO, AND T. NISHIZEKI, Secret sharing schemes realizing general access structure, in Proceedings of the IEEE Global Telecommunication Conference, Globecom '87, IEEE Press, Piscataway, NJ, 1987, pp. 99-102. Journal version: Multiple assignment scheme for sharing secret, J. Cryptology, 6 (1993), pp. 15-20.
-
(1987)
Proceedings of the IEEE Global Telecommunication Conference, Globecom '87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
23
-
-
0027289776
-
Multiple assignment scheme for sharing secret
-
Journal version
-
M. ITO, A. SAITO, AND T. NISHIZEKI, Secret sharing schemes realizing general access structure, in Proceedings of the IEEE Global Telecommunication Conference, Globecom '87, IEEE Press, Piscataway, NJ, 1987, pp. 99-102. Journal version: Multiple assignment scheme for sharing secret, J. Cryptology, 6 (1993), pp. 15-20.
-
(1993)
J. Cryptology
, vol.6
, pp. 15-20
-
-
-
24
-
-
84966614707
-
Multisecret threshold schemes
-
Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Springer-Verlag, New York
-
W. JACKSON, K. M. MARTIN, AND C. M. O'KEEFE, Multisecret threshold schemes, in Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Lecture Notes in Comput. Sci. 773, Springer-Verlag, New York, 1994, pp. 126-135.
-
(1994)
Lecture Notes in Comput. Sci.
, vol.773
, pp. 126-135
-
-
Jackson, W.1
Martin, K.M.2
O'Keefe, C.M.3
-
25
-
-
84955590494
-
On sharing many secrets
-
ASIACRYPT '94, J. Pieprzyk and R. Safavi-Naini, eds., Springer-Verlag, New York
-
W. JACKSON, K. M. MARTIN, AND C. M. O'KEEFE, On sharing many secrets, in ASIACRYPT '94, J. Pieprzyk and R. Safavi-Naini, eds., Lecture Notes in Comput. Sci. 917, Springer-Verlag, New York, 1995, pp. 42-54.
-
(1995)
Lecture Notes in Comput. Sci.
, vol.917
, pp. 42-54
-
-
Jackson, W.1
Martin, K.M.2
O'Keefe, C.M.3
-
26
-
-
0013229183
-
Ideal secret sharing schemes with multiple secrets
-
W. JACKSON, K. M. MARTIN, AND C. M. O'KEEFE, Ideal secret sharing schemes with multiple secrets, J. Cryptology, 9 (1996), pp. 233-250.
-
(1996)
J. Cryptology
, vol.9
, pp. 233-250
-
-
Jackson, W.1
Martin, K.M.2
O'Keefe, C.M.3
-
27
-
-
0020543282
-
On secret sharing systems
-
E. D. KARNIN, J. W. GREENE, AND M. E. HELLMAN, On secret sharing systems, IEEE Trans. Inform. Theory, 29 (1983), pp. 35-41.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
28
-
-
85037464261
-
-
Private communication
-
J. KILIAN AND N. NISAN, Private communication, 1990.
-
(1990)
-
-
Kilian, J.1
Nisan, N.2
-
29
-
-
85023433586
-
Generalized linear threshold scheme
-
Advances in Cryptology - CRYPTO '84, G. R. Blakley and D. Chaum, eds., Springer-Verlag, New York
-
S. C. KOTHARI, Generalized linear threshold scheme, in Advances in Cryptology - CRYPTO '84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Comput. Sci. 196, Springer-Verlag, New York, 1985, pp. 231-241.
-
(1985)
Lecture Notes in Comput. Sci.
, vol.196
, pp. 231-241
-
-
Kothari, S.C.1
-
30
-
-
0002365530
-
Privacy and communication complexity
-
E. KUSHILEVITZ, Privacy and communication complexity, SIAM J. Discrete Math., 5 (1992), pp. 273-284.
-
(1992)
SIAM J. Discrete Math.
, vol.5
, pp. 273-284
-
-
Kushilevitz, E.1
-
31
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
R. J. MCELIECE AND D. V. SARWATE, On sharing secrets and Reed-Solomon codes, Comm. ACM, 24 (1981), pp. 583-584.
-
(1981)
Comm. ACM
, vol.24
, pp. 583-584
-
-
Mceliece, R.J.1
Sarwate, D.V.2
-
32
-
-
0020881178
-
Randomized Byzantine generals
-
IEEE Press, Piscataway, NJ
-
M. O. RABIN, Randomized Byzantine generals, in Proceedings of the 24th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, Piscataway, NJ, 1983, pp. 403-409.
-
(1983)
Proceedings of the 24th Annual IEEE Symposium on Foundations of Computer Science
, pp. 403-409
-
-
Rabin, M.O.1
-
33
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, eds., Academic Press, New York
-
R. L. RIVEST, L. ADLEMAN, AND M. L. DERTOUZOS, On data banks and privacy homomorphisms, in Foundations of Secure Computation, R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, eds., Academic Press, New York, 1978, pp. 169-179.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
34
-
-
38249009286
-
On secret-sharing matroids
-
P. D. SEYMOUR, On secret-sharing matroids, J. Combin. Theory Ser. B, 56 (1992), pp. 69-73.
-
(1992)
J. Combin. Theory Ser. B
, vol.56
, pp. 69-73
-
-
Seymour, P.D.1
-
35
-
-
0018545449
-
How to share a secret
-
A. SHAMIR, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
36
-
-
0003038453
-
An introduction to shared secret and/or shared control and their application
-
The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ
-
G. J. SIMMONS, An introduction to shared secret and/or shared control and their application, in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ, 1992, pp. 441-497.
-
(1992)
Contemporary Cryptology
, pp. 441-497
-
-
Simmons, G.J.1
-
37
-
-
0003128147
-
The geometry of shared secret schemes
-
G. J. SIMMONS, W. JACKSON, AND K. M. MARTIN, The geometry of shared secret schemes, Bull. Inst. Combin. Appl., 1 (1991), pp. 71-88.
-
(1991)
Bull. Inst. Combin. Appl.
, vol.1
, pp. 71-88
-
-
Simmons, G.J.1
Jackson, W.2
Martin, K.M.3
-
38
-
-
0000708528
-
An explication of secret sharing schemes
-
D. R. STINSON, An explication of secret sharing schemes, Des. Codes Cryptogr., 2 (1992), pp. 357-390.
-
(1992)
Des. Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
|