-
1
-
-
85027202957
-
Generalized Secret Sharing and Monotone Functions
-
S. Goldwasser, ed., Advances in Cryptology - CRYPTO 88, Springer, Berlin
-
J.C. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, in: S. Goldwasser, ed., Advances in Cryptology - CRYPTO 88, Lecture Notes in Computer Science, Vol. 403 (Springer, Berlin, 1985) 27-35.
-
(1985)
Lecture Notes in Computer Science
, vol.403
, pp. 27-35
-
-
Benaloh, J.C.1
Leichter, J.2
-
2
-
-
0346870109
-
How to say 'no'
-
Quisquater and Vandewalle eds., Advances in Cryptology -EUROCRYPT 89, Springer, Berlin
-
A. Beutelspacher, How to say 'no', in: Quisquater and Vandewalle eds., Advances in Cryptology -EUROCRYPT 89, Lecture Notes in Computer Science, Vol. 434 (Springer, Berlin, 1990) 491-496.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 491-496
-
-
Beutelspacher, A.1
-
4
-
-
85028918825
-
Threshold schemes with disenrollment
-
E. Brickell, ed., Advances in Cryptology - CRYPTO '92, Springer, Berlin
-
B. Blakley, G.R. Blakley, A.H. Chan, and J.L. Massey, Threshold schemes with disenrollment, in: E. Brickell, ed., Advances in Cryptology - CRYPTO '92, Lecture Notes in Computer Science, Vol. 740 (Springer, Berlin, 1993) 546-554.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 546-554
-
-
Blakley, B.1
Blakley, G.R.2
Chan, A.H.3
Massey, J.L.4
-
6
-
-
84996527783
-
Fully Dynamic Secret Sharing Schemes
-
D.R. Stinson, ed., Advances in Cryptology - CRYPTO 93, Springer, Berlin
-
C. Blundo, A. Cresti, A. De Santis, and U. Vaccaro, Fully Dynamic Secret Sharing Schemes, in: D.R. Stinson, ed., Advances in Cryptology - CRYPTO 93, Lecture Notes in Computer Science, Vol. 773 (Springer, Berlin, 1994) 126-135.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 126-135
-
-
Blundo, C.1
Cresti, A.2
De Santis, A.3
Vaccaro, U.4
-
7
-
-
85005949623
-
Multi-Secret Sharing Schemes
-
Y. Desmedt, ed., Advances in Cryptology - CRYPTO 94, Springer, Berlin
-
C. Blundo, A. De Santis, G. Di Crescenzo, A. Giorgio Gaggia, and U. Vaccaro, Multi-Secret Sharing Schemes, in: Y. Desmedt, ed., Advances in Cryptology - CRYPTO 94, Lecture Notes in Computer Science, Vol. 839 (Springer, Berlin, 1994) 150-163.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 150-163
-
-
Blundo, C.1
De Santis, A.2
Di Crescenzo, G.3
Giorgio Gaggia, A.4
Vaccaro, U.5
-
8
-
-
67349239234
-
Secret Sharing Schemes with Veto Capabilities
-
C. Cohen, S. Litsyn, A. Lobstein and G. Zemor, eds., Proceedings of the French-Israeli Workshop in Algebraic Coding, Springer, Berlin
-
C. Blundo, A. De Santis, L. Gargano and U. Vaccaro, Secret Sharing Schemes with Veto Capabilities, in: C. Cohen, S. Litsyn, A. Lobstein and G. Zemor, eds., Proceedings of the French-Israeli Workshop in Algebraic Coding, Lecture Notes in Computer Science, Vol. 781 (Springer, Berlin, 1994) 82-89.
-
(1994)
Lecture Notes in Computer Science
, vol.781
, pp. 82-89
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
9
-
-
0029277778
-
New bounds on the information rate of secret sharing schemes
-
C. Blundo, A. De Santis, A. Giorgio Gaggia and U. Vaccaro, New bounds on the information rate of secret sharing schemes, IEEE Trans. Inform. Theory 41 (1995) 549-554.
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, pp. 549-554
-
-
Blundo, C.1
De Santis, A.2
Giorgio Gaggia, A.3
Vaccaro, U.4
-
10
-
-
0029631974
-
Graph decomposition and secret sharing schemes
-
C. Blundo, A. De Santis, D.R. Stinson and U. Vaccaro, Graph decomposition and secret sharing schemes, J. Cryptology 8 (1995) 39-64; preliminary version in: R. Rueppel, ed., Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, Vol. 658 (Springer, Berlin, 1993) 1-24.
-
(1995)
J. Cryptology
, vol.8
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
11
-
-
0029631974
-
-
Advances in Cryptology - EUROCRYPT '92, Springer, Berlin
-
C. Blundo, A. De Santis, D.R. Stinson and U. Vaccaro, Graph decomposition and secret sharing schemes, J. Cryptology 8 (1995) 39-64; preliminary version in: R. Rueppel, ed., Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, Vol. 658 (Springer, Berlin, 1993) 1-24.
-
(1993)
Lecture Notes in Computer Science
, vol.658
, pp. 1-24
-
-
Rueppel, R.1
-
12
-
-
33749269532
-
Efficient sharing of many secrets
-
P. Enjalbert, A. Finkel and K.W. Wagner, eds., Proc. STACS '93 (10th Symp. on Theoretical Aspects of Computer Science), Springer, Berlin
-
C. Blundo, A. De Santis and U. Vaccaro, Efficient sharing of many secrets, in: P. Enjalbert, A. Finkel and K.W. Wagner, eds., Proc. STACS '93 (10th Symp. on Theoretical Aspects of Computer Science), Lecture Notes in Computer Science, Vol. 665 (Springer, Berlin, 1993) 692-703.
-
(1993)
Lecture Notes in Computer Science
, vol.665
, pp. 692-703
-
-
Blundo, C.1
De Santis, A.2
Vaccaro, U.3
-
14
-
-
85027395928
-
Randomness in distribution protocols
-
S. Abiteboul and E. Shamir, eds., Proc. 21st Internat. Colloq. on Automata, Languages and Programming (ICALP '94), Springer, Berlin
-
C. Blundo, A. De Santis, and U. Vaccaro, Randomness in distribution protocols, in: S. Abiteboul and E. Shamir, eds., Proc. 21st Internat. Colloq. on Automata, Languages and Programming (ICALP '94), Lecture Notes in Computer Science, Vol. 820 (Springer, Berlin, 1994) 568-579.
-
(1994)
Lecture Notes in Computer Science
, vol.820
, pp. 568-579
-
-
Blundo, C.1
De Santis, A.2
Vaccaro, A.U.3
-
15
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E.F. Brickell and D.M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology 4 (1991) 123-124.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-124
-
-
Brickell, E.F.1
Davenport, D.M.2
-
16
-
-
0005167951
-
The detection of cheaters in threshold schemes
-
E.F. Brickell and D.R. Stinson, The detection of cheaters in threshold schemes, SIAM J. Discrete Math. 4 (1991) 502-510.
-
(1991)
SIAM J. Discrete Math.
, vol.4
, pp. 502-510
-
-
Brickell, E.F.1
Stinson, D.R.2
-
17
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E.F. Brickell and D.R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology 5 (1992) 153-166.
-
(1992)
J. Cryptology
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
18
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R.M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro, On the size of shares for secret sharing schemes, J. Cryptology 6 (1993) 157-168.
-
(1993)
J. Cryptology
, vol.6
, pp. 157-168
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
19
-
-
85028775273
-
Size of shares and probability of cheating in threshold schemes
-
T. Helleseth, ed., Advances in Cryptology - EUROCRYPT '93, Springer, Berlin
-
M. Carpentieri, A. De Santis and U. Vaccaro, Size of shares and probability of cheating in threshold schemes, in: T. Helleseth, ed., Advances in Cryptology - EUROCRYPT '93, Lecture Notes in Computer Science, Vol. 765 (Springer, Berlin, 1994) 118-125.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 118-125
-
-
Carpentieri, M.1
De Santis, A.2
Vaccaro, U.3
-
20
-
-
84948972864
-
The size of a share must be large
-
to appear in: A. De Santis, ed., Advances in Cryptology - EUROCRYPT '94, Springer, Berlin
-
L. Csirmaz, The size of a share must be large, to appear in: A. De Santis, ed., Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, Vol. 950 (Springer, Berlin, 1995).
-
(1995)
Lecture Notes in Computer Science
, vol.950
-
-
Csirmaz, L.1
-
27
-
-
84921169347
-
A protocol to set up shared secret schemes without the assistance of a mutually trusted party
-
Advances in Cryptology - CRYPTO 90, Menezes and Vanstone eds., Springer, Berlin
-
I. Ingemarsson and G.J. Simmons, A protocol to set up shared secret schemes without the assistance of a mutually trusted party, in: Advances in Cryptology - CRYPTO 90, Menezes and Vanstone eds., Lecture Notes in Computer Science, Vol. 473 (Springer, Berlin, 1991) 266-282.
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 266-282
-
-
Ingemarsson, I.1
Simmons, G.J.2
-
28
-
-
0023543848
-
Secret sharing scheme realizing general access structure
-
Tokyo, Japan
-
M. Ito, A. Saito and T. Nishizeki, Secret sharing scheme realizing general access structure, in: Proc. IEEE Global Telecommunications Conf, Globecom 87, (Tokyo, Japan, 1987).
-
(1987)
Proc. IEEE Global Telecommunications Conf, Globecom 87
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
29
-
-
84966614707
-
Multisecret threshold schemes
-
D.R. Stinson, ed., Advances in Cryptology -CRYPTO '93, Springer, Berlin
-
W.-A. Jackson, K.M. Martin, and C.M. O'Keefe, Multisecret threshold schemes, in: D.R. Stinson, ed., Advances in Cryptology -CRYPTO '93, Lecture Notes in Computer Science, Vol. 773 (Springer, Berlin, 1994) 126-135.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 126-135
-
-
Jackson, W.-A.1
Martin, K.M.2
O'Keefe, C.M.3
-
30
-
-
0020543282
-
On secret sharing systems
-
E.D. Karnin, J.W. Greene and M.E. Hellman, On secret sharing systems, IEEE Trans. Inform. Theory, IT-29, (1) (1983) 35-41.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
31
-
-
0002918554
-
The complexity of nonuniform random number generation
-
J.F. Traub, ed., Academic Press, New york
-
D.E. Knuth and A.C. Yao, The complexity of nonuniform random number generation, in: J.F. Traub, ed., Algorithms and Complexity (Academic Press, New york, 1976) 357-428.
-
(1976)
Algorithms and Complexity
, pp. 357-428
-
-
Knuth, D.E.1
Yao, A.C.2
-
32
-
-
85023433586
-
Generalized linear threshold schemes
-
G.R. Blakley and D. Chaum, eds., Advances in Cryptology - CRYPTO 84, Springer Berlin
-
S.C. Kothari, Generalized linear threshold schemes, in: G.R. Blakley and D. Chaum, eds., Advances in Cryptology - CRYPTO 84, Lecture Notes in Computer Science, Vol 196 (Springer Berlin, 1985) 231-241.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 231-241
-
-
Kothari, S.C.1
-
33
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
R.J. McEliece and D.V. Sarwate, On sharing secrets and Reed-Solomon codes, Comm. ACM 24 (1981) 583-584.
-
(1981)
Comm. ACM
, vol.24
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
36
-
-
84887505836
-
Visual cryptography
-
to appear A. De Santis, ed., Advances in Cryptology - Eurocrypt '94, (Springer, Berlin)
-
M. Naor and A. Shamir, Visual cryptography, to appear in: A. De Santis, ed., Advances in Cryptology - Eurocrypt '94, Lecture Notes in Computer Science, Vol. 950 (Springer, Berlin).
-
Lecture Notes in Computer Science
, vol.950
-
-
Naor, M.1
Shamir, A.2
-
37
-
-
0040590338
-
Covering the edges of a graph by
-
L. Lovász, D. Miklós and T. Szönyi, eds., Colloquia Mathematica Soc., János Bolyai North-Holland, Amsterdam
-
L. Pyber, Covering the edges of a graph by..., in: L. Lovász, D. Miklós and T. Szönyi, eds., Sets, Graphs and Numbers, Colloquia Mathematica Soc., János Bolyai (North-Holland, Amsterdam, 1992) 583-610
-
(1992)
Sets, Graphs and Numbers
, pp. 583-610
-
-
Pyber, L.1
-
38
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, in: Proc. 21st ACM Symp. on Theory of Computing (1989) 73-85.
-
(1989)
Proc. 21st ACM Symp. on Theory of Computing
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
39
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM 22 (11) (1979) 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
40
-
-
0005180192
-
Robust shared secret schemes or 'how to be sure you have the right answer even though you don't know the question'
-
G.J. Simmons, Robust shared secret schemes or 'how to be sure you have the right answer even though you don't know the question', Congr. Numer. 68 (1989) 215-248.
-
(1989)
Congr. Numer.
, vol.68
, pp. 215-248
-
-
Simmons, G.J.1
-
41
-
-
84898275803
-
Prepositioned shared secret and/or shared control schemes
-
Proc. Advances in Cryptology - CRYPTO '89, Springer, Berlin
-
G.J. Simmons, Prepositioned shared secret and/or shared control schemes, in: Proc. Advances in Cryptology - CRYPTO '89, Lecture Notes in Computer Science, Vol. 434 (Springer, Berlin, 1990) 436-467.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 436-467
-
-
Simmons, G.J.1
-
43
-
-
0000708528
-
An explication of secret sharing schemes
-
D.R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography 2 (1992) 357-390.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
44
-
-
85028945826
-
New general lower bounds on the information rate of secret sharing schemes
-
E. Brickell, ed., Proc. Advances in Cryptology - CRYPTO '92, Springer Berlin
-
D.R. Stinson, New general lower bounds on the information rate of secret sharing schemes, in: E. Brickell, ed., Proc. Advances in Cryptology - CRYPTO '92, Lecture Notes in Computer Science, Vol. 740, (Springer Berlin, 1993) 170-184.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 170-184
-
-
Stinson, D.R.1
-
45
-
-
0028323999
-
Decomposition constructions for secret sharing schemes
-
D.R. Stinson, Decomposition constructions for secret sharing schemes, IEEE Trans. Inform. Theory 40 (1994) 118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
-
46
-
-
0024141971
-
How to share a secret with cheaters
-
M. Tompa and H. Woll, How to share a secret with cheaters, J. Cryptology 1 (1988) 133-138.
-
(1988)
J. Cryptology
, vol.1
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
47
-
-
51249184730
-
Covering of graphs by complete bipartite subgraphs; complexity of 0-1 matrices
-
Z. Tuza, Covering of graphs by complete bipartite subgraphs; complexity of 0-1 matrices, Combinatorica 4 (1) (1984) 111-116.
-
(1984)
Combinatorica
, vol.4
, Issue.1
, pp. 111-116
-
-
Tuza, Z.1
|