-
2
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979) How to share a secret. Commun. ACM, 22, 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
0000708528
-
An explication of secret sharing schemes
-
Stinson, D. R. (1992) An explication of secret sharing schemes. Des. Codes Cryptogr., 2, 357-390.
-
(1992)
Des. Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
5
-
-
84921169347
-
A protocol to set up shared secret schemes without the assistance of a mutually trusted party
-
Springer-Verlag, Berlin
-
Ingemarsson, I. and Simmons. G. J. (1991) A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In Adv. in Cryptology - EUROCRYPT'90 (Lect. Notes Comput. Sci., vol. 473), pp. 266-282. Springer-Verlag, Berlin.
-
(1991)
Adv. in Cryptology - Eurocrypt'90 Lect. Notes Comput. Sci.
, vol.473
, pp. 266-282
-
-
Ingemarsson, I.1
Simmons, G.J.2
-
6
-
-
0342890136
-
Mutually trusted authority free secret sharing schemes
-
Jackson, W.-A., Martin, K. M. and O'Keefe, C. M. (1997) Mutually trusted authority free secret sharing schemes. J. Cryptol, 10, 261-289.
-
(1997)
J. Cryptol
, vol.10
, pp. 261-289
-
-
Jackson, W.-A.1
Martin, K.M.2
O'Keefe, C.M.3
-
7
-
-
0000354685
-
Some ideal secret sharing schemes
-
Brickell, E. F. (1989) Some ideal secret sharing schemes. J. Comb. Math. Comb. Comput., 9, 105-113.
-
(1989)
J. Comb. Math. Comb. Comput.
, vol.9
, pp. 105-113
-
-
Brickell, E.F.1
-
8
-
-
0003128147
-
The geometry of shared secret schemes
-
Simmons, G. J., Jackson, W.-A. and Martin, K. (1991) The geometry of shared secret schemes. Bull. Inst. Combin. Appl., 1, 71-88.
-
(1991)
Bull. Inst. Combin. Appl.
, vol.1
, pp. 71-88
-
-
Simmons, G.J.1
Jackson, W.-A.2
Martin, K.3
-
9
-
-
0001522694
-
On the information rate of perfect secret sharing schemes
-
van Dijk, M. (1995) On the information rate of perfect secret sharing schemes. Des. Codes Cryptogr., 6, 143-169.
-
(1995)
Des. Codes Cryptogr.
, vol.6
, pp. 143-169
-
-
Van Dijk, M.1
-
10
-
-
84958639277
-
Efficient generation of shared rsa keys
-
Springer-Verlag, Berlin
-
Boneh, D. and Franklin, M. (1997) Efficient generation of shared RSA keys. In Adv. in Cryptology - CRYPTO'97 (Lect. Notes Comput. Sci., vol. 1294), pp. 425-439. Springer-Verlag, Berlin.
-
(1997)
Adv. in Cryptology - CRYPTO'97 Lect. Notes Comput. Sci.
, vol.1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
84947926543
-
Robust threshold DSS signatures
-
Springer-Verlag, Berlin
-
Gennaro, R., Jarecki, S., Krawczyk, H. and Rabin, T. (1996) Robust threshold DSS signatures. In Adv. in Cryptology -EUROCRYPT'96 (Lect. Notes Comput. Sci., vol. 1070), pp. 354-371. Springer-Verlag, Berlin.
-
(1996)
Adv. in Cryptology -eUROCRYPT'96 Lect. Notes Comput. Sci.
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
84957626176
-
Proactive secret sharing
-
Springer-Verlag, Berlin
-
Herzberg, A., Jarecki, S., Krawczyk, H. and Yung, M. (1995) Proactive secret sharing. In Adv. in Cryptology - CRYPTO'95 (Lect. Notes Comput. Sci., vol. 963), pp. 339-352. Springer-Verlag, Berlin.
-
(1995)
Adv. in Cryptology - CRYPTO'95 Lect. Notes Comput. Sci.
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
14
-
-
0013546220
-
On the dealer's randomness required in secret sharing schemes
-
Blundo, C., Giorgia Gaggia, A. and Stinson, D. R. (1997) On the dealer's randomness required in secret sharing schemes. Des. Codes Cryptogr., 11, 235-259.
-
(1997)
Des. Codes Cryptogr.
, vol.11
, pp. 235-259
-
-
Blundo, C.1
Giorgia Gaggia, A.2
Stinson, D.R.3
-
15
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret
-
Springer-Verlag, Berlin
-
Benaloh, J. (1987) Secret sharing homomorphisms: keeping shares of a secret secret. In Adv. in Cryptology - CRYPTO'86 (Lect. Notes Comput. Sci, vol. 263), pp. 251-260. Springer-Verlag, Berlin.
-
(1987)
Adv. in Cryptology - CRYPTO'86 Lect. Notes Comput. Sci
, vol.263
, pp. 251-260
-
-
Benaloh, J.1
-
16
-
-
0000527282
-
Homomorphic zero-knowledge threshold schemes over any finite abelian group
-
Desmedt, Y. G. and Frankel, Y. (1994) Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM J. Discrete Math., 4, 667-679.
-
(1994)
SIAM J. Discrete Math.
, vol.4
, pp. 667-679
-
-
Desmedt, Y.G.1
Frankel, Y.2
-
17
-
-
84979022024
-
Key escrow in mutually mistrusting domains
-
Springer-Verlag, Berlin
-
Chen, L., Gollmann, D. and Mitchell, C. J. (1997) Key escrow in mutually mistrusting domains. In Proc. of 1996 Cambridge Workshop on Security Protocols (Lect. Notes Comput. Sci., vol. 1189), pp. 139-153. Springer-Verlag, Berlin.
-
(1997)
Proc. of 1996 Cambridge Workshop on Security Protocols Lect. Notes Comput. Sci.
, vol.1189
, pp. 139-153
-
-
Chen, L.1
Gollmann, D.2
Mitchell, C.J.3
-
18
-
-
21944452447
-
Increasing efficiency of international key escrow in mutually mistrusting domains
-
Springer-Verlag, Berlin
-
Martin, K. M. (1997) Increasing efficiency of international key escrow in mutually mistrusting domains. In Cryptography and Coding (Lect. Notes Comput. Sci., vol. 1355), pp. 221-232. Springer-Verlag, Berlin.
-
(1997)
Cryptography and Coding Lect. Notes Comput. Sci.
, vol.1355
, pp. 221-232
-
-
Martin, K.M.1
-
19
-
-
84996527783
-
Fully dynamic secret sharing schemes
-
Springer-Verlag, Berlin
-
Blundo, C., Cresti, A., De Santis, A. and Vaccaro, U. (1994) Fully dynamic secret sharing schemes. In Adv. in Cryptology - CRYPTO'93 (Lect. Notes Comput. Sci., vol. 773), pp. 110-125. Springer-Verlag, Berlin.
-
(1994)
Adv. in Cryptology - CRYPTO'93 Lect. Notes Comput. Sci.
, vol.773
, pp. 110-125
-
-
Blundo, C.1
Cresti, A.2
De Santis, A.3
Vaccaro, U.4
-
20
-
-
85028918825
-
Threshold schemes with disenrollment
-
Springer-Verlag, Berlin
-
Blakley, B., Blakley, G. R., Chan, A. H. and Massey, J. (1993) Threshold schemes with disenrollment. In Adv. in Cryptology - CRYPTO'92 (Lect. Notes Comput. Sci., vol. 740), pp. 540-548. Springer-Verlag, Berlin.
-
(1993)
Adv. in Cryptology - CRYPTO'92 Lect. Notes Comput. Sci.
, vol.740
, pp. 540-548
-
-
Blakley, B.1
Blakley, G.R.2
Chan, A.H.3
Massey, J.4
-
21
-
-
0005269075
-
Untrustworthy participants in secret sharing schemes
-
Oxford University Press, Oxford, UK
-
Martin, K. M. (1993) Untrustworthy participants in secret sharing schemes. Cryptography and Coding III, pp. 255-264. Oxford University Press, Oxford, UK.
-
(1993)
Cryptography and Coding III
, pp. 255-264
-
-
Martin, K.M.1
-
22
-
-
84961369151
-
The security of ramp schemes
-
Springer-Verlag, Berlin
-
Blakley, G. R. and Meadows, C. (1985) The security of ramp schemes. In Adv. in Cryptology - CRYPTO'84 (Lect. Notes Comput. Sci., vol. 196), pp. 242-268. Springer-Verlag, Berlin.
-
(1985)
Adv. in Cryptology - CRYPTO'84 Lect. Notes Comput. Sci.
, vol.196
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
23
-
-
0006544582
-
A combinatorial interpretation of ramp schemes
-
Jackson, W.-A. and Martin, K. M. (1996) A combinatorial interpretation of ramp schemes. Australas. J. Comb., 14, 51-60.
-
(1996)
Australas. J. Comb.
, vol.14
, pp. 51-60
-
-
Jackson, W.-A.1
Martin, K.M.2
-
24
-
-
0033076984
-
An application of ramp schemes to broadcast encryption
-
Stinson, D. R. and Wei, R. (1999) An application of ramp schemes to broadcast encryption. Inf. Process. Lett., 69, 131-135.
-
(1999)
Inf. Process. Lett.
, vol.69
, pp. 131-135
-
-
Stinson, D.R.1
Wei, R.2
|