-
1
-
-
0025558124
-
-
Proceedings of Ninth Annual Joint Conference of the IEEE Computer and Communication Societies, San Francisco, CA.: June
-
Ayanoglu, E., I, C.L., Citlin, R.D., and Mazo, J.E., “Diversity Coding:Using Error Control for Self-Healing in Communication Networks,”. Proceedings of Ninth Annual Joint Conference of the IEEE Computer and Communication Societies. June5–7, San Francisco, CA. pp. 95–104.
-
Diversity Coding: Using Error Control for Self-Healing in Communication Networks
, pp. 95-104
-
-
Ayanoglu, E.1
I, C.2
Citlin, R.D.3
Mazo, J.E.4
-
2
-
-
0001318089
-
-
Proceedings of the National Computer Conference, New York.: American Federation of Information Processing Societies
-
Blakley, G.R., “Safeguarding Cryptographic Keys,”. Proceedings of the National Computer Conference. New York. Vol. 48, pp. 313–317. American Federation of Information Processing Societies.
-
Safeguarding Cryptographic Keys
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
85027202957
-
Generalized Secret Sharing and Monotone Functions
-
Springer-Verlag
-
Benaloh, J., and Leichter, J., 1990. “Generalized Secret Sharing and Monotone Functions,”. In Advances in Cryptology-EuroCrypt'90, 27–35. Springer-Verlag.
-
(1990)
Advances in Cryptology-EuroCrypt'90
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
4
-
-
1842758400
-
A Construction of Practical Secret Sharing Schemes Using Linear Block Codes
-
Springer-Verlag
-
Bertilsson, M., and Ingemarsson, I., 1992. “A Construction of Practical Secret Sharing Schemes Using Linear Block Codes,”. In Advances in Cryptology-Auscrypt'92, 2–21. Springer-Verlag.
-
(1992)
Advances in Cryptology-Auscrypt'92
, pp. 2-21
-
-
Bertilsson, M.1
Ingemarsson, I.2
-
5
-
-
0027614601
-
A New Generalized Group-oriented Cryptoscheme without Trusted Center
-
Chang, C.C., and Lee, H.C., 1993. “A New Generalized Group-oriented Cryptoscheme without Trusted Center,”. IEEE Journal on Selected Areas in Communications, 11 (5):725–729.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 725-729
-
-
Chang, C.C.1
Lee, H.C.2
-
6
-
-
0030676509
-
Efficient Cheater Identification Method for Threshold Schemes
-
Chang, C.C., and Hwang, R. J., 1996. “Efficient Cheater Identification Method for Threshold Schemes,”. IEE Proceedings- Computers and Digital Techniques, 144 (1):23–27.
-
(1996)
IEE Proceedings- Computers and Digital Techniques
, vol.144
, Issue.1
, pp. 23-27
-
-
Chang, C.C.1
Hwang, R.J.2
-
7
-
-
0034504833
-
An Efficient Multi-secret Sharing Scheme
-
Chien, H.-Y., Jan, J.-K., and Tseng, Y.-M., 2000. “An Efficient Multi-secret Sharing Scheme,”. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E83-A (12):2762–2765.
-
(2000)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E83-A
, Issue.12
, pp. 2762-2765
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
8
-
-
85023903853
-
-
10th National Security Conference, HwaLan, Taiwan.
-
Chien, H.-Y., Jan, J.-K., and Tseng, Y.-M., “On the Generalized Threshold-Based Secret Sharing Schemes,”. 10th National Security Conference. HwaLan, Taiwan.
-
On the Generalized Threshold-Based Secret Sharing Schemes
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
10
-
-
0029535977
-
-
Proceedings of the IEEE GLOBE Telecommunication Conference 1995
-
Deng, R.H., Gong, L., Lazar, A.A., and Guo, W., “Authenticated Key Distribution and Secure Broadcast Using No Conventional Encryption:A Unified Approach Based on Block Codes,”. Proceedings of the IEEE GLOBE Telecommunication Conference 1995. pp. 1193–1197.
-
Authenticated Key Distribution and Secure Broadcast Using No Conventional Encryption: A Unified Approach Based on Block Codes
, pp. 1193-1197
-
-
Deng, R.H.1
Gong, L.2
Lazar, A.A.3
Guo, W.4
-
11
-
-
84874800178
-
A Public-Key Cryptosystem and A Signature Scheme Based on Discrete Logarithm
-
Elgamal, T., 1985. “A Public-Key Cryptosystem and A Signature Scheme Based on Discrete Logarithm,”. IEEE Transactions on Information Theory, 31:469–472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
13
-
-
0028498073
-
Multistage Secret Sharing Based on One-Way Function
-
He, J., and Dawson, E., 1994. “Multistage Secret Sharing Based on One-Way Function,”. Electronics Letters, 30 (19):1591–1592.
-
(1994)
Electronics Letters
, vol.30
, Issue.19
, pp. 1591-1592
-
-
He, J.1
Dawson, E.2
-
14
-
-
84886634682
-
Comment: Multistage Secret Sharing Based on One-Way Function
-
Harn, L., 1995a. “Comment:Multistage Secret Sharing Based on One-Way Function,”. Electronics Letters, 31 (4):262
-
(1995)
Electronics Letters
, vol.31
, Issue.4
, pp. 262
-
-
Harn, L.1
-
15
-
-
0029197220
-
Multi-Secret Sharing Scheme Based on One-Way Function
-
He, J., and Dawson, E., 1995. “Multi-Secret Sharing Scheme Based on One-Way Function,”. Electronics Letters, 31 (2):93–94.
-
(1995)
Electronics Letters
, vol.31
, Issue.2
, pp. 93-94
-
-
He, J.1
Dawson, E.2
-
16
-
-
0029305471
-
Efficient Sharing (Broadcasting) of Multiple Secrets
-
Harn, L., 1995b. “Efficient Sharing (Broadcasting) of Multiple Secrets,”. IEE Proceedings-Computers and Digital Techniques, 142 (3):237–240.
-
(1995)
IEE Proceedings-Computers and Digital Techniques
, vol.142
, Issue.3
, pp. 237-240
-
-
Harn, L.1
-
17
-
-
0030195519
-
An Efficient Dynamic Threshold Scheme
-
Hwang, S.J., Chang, C.C., and Yang, W.P., 1996. “An Efficient Dynamic Threshold Scheme,”. IEICE Transactions on Information & Systems, E79-D (7):936–941.
-
(1996)
IEICE Transactions on Information & Systems
, vol.E79-D
, Issue.7
, pp. 936-941
-
-
Hwang, S.J.1
Chang, C.C.2
Yang, W.P.3
-
18
-
-
0033115859
-
A Concept of Designing Cheater Identification Methods for Secret Sharing
-
Hwang, R.J., Lee, W.B., and Chang, C.C., 1999. “A Concept of Designing Cheater Identification Methods for Secret Sharing,”. The Journal of Systems and Software, 46:7–11.
-
(1999)
The Journal of Systems and Software
, vol.46
, pp. 7-11
-
-
Hwang, R.J.1
Lee, W.B.2
Chang, C.C.3
-
20
-
-
0002223997
-
On Sharing Many Secrets
-
Springer-Verlag
-
Jackson, W.A., Martin, K.M., and O'Keefe, C.M., 1994. “On Sharing Many Secrets,”. In Advances in Cryptology-Asiacrypt'94, 42–54. Springer-Verlag.
-
(1994)
Advances in Cryptology-Asiacrypt'94
, pp. 42-54
-
-
Jackson, W.A.1
Martin, K.M.2
O'Keefe, C.M.3
-
21
-
-
0020543282
-
On secret Sharing Systems
-
Karnin, Greene J.W., and Hellman, M.E., 1983. “On secret Sharing Systems,”. IEEE Transactions on Information Theory, IT-29:35–41.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, pp. 35-41
-
-
Karnin, G.J.W.1
Hellman, M.E.2
-
24
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Lamport, L., 1981. “Password Authentication with Insecure Communication,”. Communications of the ACM, 24 (11):770–772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
25
-
-
33749312824
-
Dynamic Threshold Scheme Based on the Definition of Cross-product in an N-dimensional Linear Space
-
Springer-Verlag
-
Laih, C.S., Harn, L., Lee, J.Y., and Hwang, T.L., 1991. “Dynamic Threshold Scheme Based on the Definition of Cross-product in an N-dimensional Linear Space,”. In Advances in Cryptology-CRYPTO'89, Lecture Notes in Computer Science, No. 435 286–298. Springer-Verlag.
-
(1991)
Advances in Cryptology-CRYPTO'89
, pp. 286-298
-
-
Laih, C.S.1
Harn, L.2
Lee, J.Y.3
Hwang, T.L.4
-
26
-
-
0344259195
-
A Generalized Secret Sharing Scheme with Cheater Detection
-
Springer-Verlag
-
Lin, H.Y., and Harn, L., 1991. “A Generalized Secret Sharing Scheme with Cheater Detection,”. In Advances in Cryptology-AsiaCrypt'91, 83–87. Springer-Verlag.
-
(1991)
Advances in Cryptology-AsiaCrypt'91
, pp. 83-87
-
-
Lin, H.Y.1
Harn, L.2
-
27
-
-
0345121672
-
Generalized Threshold Cryptosystems
-
Springer-Verlag
-
Laih, C.S., and Harn, L., 1991. “Generalized Threshold Cryptosystems,”. In Advances in Cryptology-AsiaCrypt'91, 88–92. Springer-Verlag.
-
(1991)
Advances in Cryptology-AsiaCrypt'91
, pp. 88-92
-
-
Laih, C.S.1
Harn, L.2
-
28
-
-
0033591581
-
-
Morillo, P., Padro, C., Saez, G., and Villar, J.L., 1999. “Weighted Threshold Secret Sharing Schemes,”. Information Processing Letters 70 211–216.
-
(1999)
Weighted Threshold Secret Sharing Schemes
, pp. 211-216
-
-
Morillo, P.1
Padro, C.2
Saez, G.3
Villar, J.L.4
-
29
-
-
84936033986
-
The Digital Signature Standard by NIST
-
NIST. 1992. “The Digital Signature Standard by NIST,”. Communications of the ACM, 35 (7):36–40.
-
(1992)
Communications of the ACM
, vol.35
, Issue.7
, pp. 36-40
-
-
-
31
-
-
0030572225
-
Online Multiple Secret Sharing
-
Pinch, R.G.E., 1996. “Online Multiple Secret Sharing,”. Electronics Letters, 32 (12):1087–1088.
-
(1996)
Electronics Letters
, vol.32
, Issue.12
, pp. 1087-1088
-
-
Pinch, R.G.E.1
-
32
-
-
0018545449
-
How to Share a Secret
-
Shamir, A., 1979. “How to Share a Secret,”. Communications of the ACM, 22 (11):612–613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
0033076984
-
An application of Ramp Schemes to Broadcast Encryption
-
Stinson, D.R., and Wei, R., 1999. “An application of Ramp Schemes to Broadcast Encryption,”. Information Processing Letters, 69:131–135.
-
(1999)
Information Processing Letters
, vol.69
, pp. 131-135
-
-
Stinson, D.R.1
Wei, R.2
-
34
-
-
0032188199
-
Secret Sharing in Graph-Based Prohibited Structures
-
Sun, H.M., and Shieh, S.P., 1998. “Secret Sharing in Graph-Based Prohibited Structures,”. Computers and Mathematics with Applications, 36 (7):131–140.
-
(1998)
Computers and Mathematics with Applications
, vol.36
, Issue.7
, pp. 131-140
-
-
Sun, H.M.1
Shieh, S.P.2
-
36
-
-
0032627523
-
On-line Multiple Secret Sharing Based on a One-Way Function
-
Sun, H.M., 1999. “On-line Multiple Secret Sharing Based on a One-Way Function,”. Computer Communications, 22:745–748.
-
(1999)
Computer Communications
, vol.22
, pp. 745-748
-
-
Sun, H.M.1
-
37
-
-
0032623828
-
Cheater Identification in (t n) Threshold Scheme
-
Tan, K.J., Zhu, H.W., and Gu, S.J., 1999. “Cheater Identification in (t n) Threshold Scheme,”. Computer Communications, 22:762–765.
-
(1999)
Computer Communications
, vol.22
, pp. 762-765
-
-
Tan, K.J.1
Zhu, H.W.2
Gu, S.J.3
-
38
-
-
0032661483
-
New Generalized Group-Oriented Cryptosystem Based on Diffie-Hellman Scheme
-
Tsai, J.J., Hwang, T., and Wang, C.H., 1999. “New Generalized Group-Oriented Cryptosystem Based on Diffie-Hellman Scheme,”. Computer Communications, 22:727–729.
-
(1999)
Computer Communications
, vol.22
, pp. 727-729
-
-
Tsai, J.J.1
Hwang, T.2
Wang, C.H.3
-
39
-
-
0032628732
-
General Secret Sharing Schemes
-
Tan, K.J., and Zhu, H.W., 1999. “General Secret Sharing Schemes,”. Computer Communications, 22:755–757.
-
(1999)
Computer Communications
, vol.22
, pp. 755-757
-
-
Tan, K.J.1
Zhu, H.W.2
-
40
-
-
0029211714
-
A Geometric Approach for Sharing Secrets
-
Wu, T.C., and He, W.H., 1995. “A Geometric Approach for Sharing Secrets,”. Computers & Security, 14:135–145.
-
(1995)
Computers & Security
, vol.14
, pp. 135-145
-
-
Wu, T.C.1
He, W.H.2
-
41
-
-
0029369348
-
Cheating Detection and Cheater Identification in Secret Sharing Schemes
-
Wu, T.C., and Wu, T.S., 1995. “Cheating Detection and Cheater Identification in Secret Sharing Schemes,”. IEE Proceedings- Computers and Digital Techniques, 142:367–369.
-
(1995)
IEE Proceedings- Computers and Digital Techniques
, vol.142
, pp. 367-369
-
-
Wu, T.C.1
Wu, T.S.2
-
42
-
-
0028396566
-
Thresh Old Cryptosystem with Multiple Secret Sharing Policies
-
Harn, L., Lin, H.Y., and Yang, S., 1994. “Thresh Old Cryptosystem with Multiple Secret Sharing Policies,”. IEE Proceedings- Computers and Digital Techniques, 141:142–144.
-
(1994)
IEE Proceedings- Computers and Digital Techniques
, vol.141
, pp. 142-144
-
-
Harn, L.1
Lin, H.Y.2
Yang, S.3
-
43
-
-
0028542891
-
Method for Constructing a Group-Oriented Cipher System
-
Lin, C.H., and Chang, C.C., 1994. “Method for Constructing a Group-Oriented Cipher System,”. Computer Communications, 17 (11):805–808.
-
(1994)
Computer Communications
, vol.17
, Issue.11
, pp. 805-808
-
-
Lin, C.H.1
Chang, C.C.2
|