-
1
-
-
84957652167
-
General short computational secret sharing schemes
-
Adv. in Cryptology: EUROCRYPT '95
-
P. Beguin and A. Cresti, General short computational secret sharing schemes, Adv. in Cryptology: EUROCRYPT '95, Lecture Notes in Comput. Sci., 921 (1995) pp. 194-208.
-
(1995)
Lecture Notes in Comput. Sci.
, vol.921
, pp. 194-208
-
-
Beguin, P.1
Cresti, A.2
-
2
-
-
0346870109
-
How to say no
-
Advances in Cryptology: Proceedings of EUROCRYPT '89
-
A. Beutelspacher, How to say no, Advances in Cryptology: Proceedings of EUROCRYPT '89, Lecture Notes in Comput. Sci., 434 (1990) pp. 491-496.
-
(1990)
Lecture Notes in Comput. Sci.
, vol.434
, pp. 491-496
-
-
Beutelspacher, A.1
-
3
-
-
21844502521
-
On general perfect secret sharing schemes
-
Adv. in Cryptology: CRYPTO'95
-
G. R. Blakley and G. A. Kabatianski, On general perfect secret sharing schemes, Adv. in Cryptology: CRYPTO'95, Lecture Notes in Comput. Sci., 963 (1995) pp. 367-371.
-
(1995)
Lecture Notes in Comput. Sci.
, vol.963
, pp. 367-371
-
-
Blakley, G.R.1
Kabatianski, G.A.2
-
4
-
-
84961369151
-
Security of ramp schemes
-
Adv. in Cryptology: CRYPTO '84
-
G. R. Blakley and C. Meadows, Security of ramp schemes, Adv. in Cryptology: CRYPTO '84, Lecture Notes in Comput. Sci., 196 (1985) pp. 242-268.
-
(1985)
Lecture Notes in Comput. Sci.
, vol.196
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
6
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Adv. in Cryptology: CRYPTO'92
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfectly-secure key distribution for dynamic conferences, Adv. in Cryptology: CRYPTO'92, Lecture Notes in Comput. Sci., 740 (1993) pp. 471-481.
-
(1993)
Lecture Notes in Comput. Sci.
, vol.740
, pp. 471-481
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
7
-
-
0029631974
-
Graph decompositions and secret sharing schemes
-
C. Blundo, A. De Santis, D.R. Stinson, and U. Vaccaro, Graph decompositions and secret sharing schemes, J. Cryptology, Vol. 8 (1995) pp. 39-64.
-
(1995)
J. Cryptology
, vol.8
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
8
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology, Vol. 4 (1991) pp. 123-134.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
9
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. F. Brickell and D. R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, Vol. 5 (1992) pp. 153-166.
-
(1992)
J. Cryptology
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
10
-
-
0013482322
-
A note on secret sharing schemes
-
Springer Verlag
-
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, A note on secret sharing schemes, Sequences II: Methods in Communications, Security and Computer Science, Springer Verlag (1993) pp. 335-344.
-
(1993)
Sequences II: Methods in Communications, Security and Computer Science
, pp. 335-344
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
11
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the size of shares for secret sharing schemes, J. Cryptology, Vol. 6 (1993) pp. 157-167.
-
(1993)
J. Cryptology
, vol.6
, pp. 157-167
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
13
-
-
0001522694
-
On the information rate of perfect secret sharing schemes
-
M. van Dijk, On the information rate of perfect secret sharing schemes, Designs, Codes, and Cryptography, Vol. 6 (1995) pp. 143-169.
-
(1995)
Designs, Codes, and Cryptography
, vol.6
, pp. 143-169
-
-
Van Dijk, M.1
-
14
-
-
0003944144
-
A linear construction of secret sharing schemes
-
M. van Dijk, A linear construction of secret sharing schemes, Designs, Codes and Cryptography., Vol. 12 (1997) pp. 161-201.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, pp. 161-201
-
-
Van Dijk, M.1
-
17
-
-
0001652944
-
Perfect secret sharing schemes on five participants
-
W.-A. Jackson and K. M. Martin, Perfect secret sharing schemes on five participants, Designs, Codes and Cryptography, Vol. 9 (1996) pp. 267-286.
-
(1996)
Designs, Codes and Cryptography
, vol.9
, pp. 267-286
-
-
Jackson, W.-A.1
Martin, K.M.2
-
18
-
-
84957692463
-
Efficient secret sharing without a mutually trusted authority
-
Adv. in Cryptology: EUROCRYPT '95
-
W.-A. Jackson, K. M. Martin, and C. M. O'Keefe, Efficient secret sharing without a mutually trusted authority, Adv. in Cryptology: EUROCRYPT '95, Lecture Notes in Comput. Sci., 921 (1995) pp. 183-193.
-
(1995)
Lecture Notes in Comput. Sci.
, vol.921
, pp. 183-193
-
-
Jackson, W.-A.1
Martin, K.M.2
O'Keefe, C.M.3
-
19
-
-
0032217850
-
An algorithm for efficient geometric secret sharing schemes
-
to appear
-
W.-A. Jackson and K. M. Martin, An algorithm for efficient geometric secret sharing schemes, to appear in Utilitas Mathematica.
-
Utilitas Mathematica
-
-
Jackson, W.-A.1
Martin, K.M.2
-
20
-
-
84985848633
-
Nonperfect secret sharing schemes and matroids
-
Adv. in Cryptology: EUROCRYPT '93
-
K. Kurosawa, K. Okada, K. Sakano, W. Ogata, and S. Tsujii, Nonperfect secret sharing schemes and matroids, Adv. in Cryptology: EUROCRYPT '93, Lecture Notes in Comput. Sci., 765 (1994) pp. 126-141.
-
(1994)
Lecture Notes in Comput. Sci.
, vol.765
, pp. 126-141
-
-
Kurosawa, K.1
Okada, K.2
Sakano, K.3
Ogata, W.4
Tsujii, S.5
-
23
-
-
0346648727
-
Nonperfect secret sharing schemes
-
Adv. in Cryptology: AUSCRYPT '92
-
W. Ogata, K. Kurosawa, and S. Tsujii, Nonperfect secret sharing schemes, Adv. in Cryptology: AUSCRYPT '92, Lecture Notes in Comput. Sci., 718 (1993) pp. 56-66.
-
(1993)
Lecture Notes in Comput. Sci.
, vol.718
, pp. 56-66
-
-
Ogata, W.1
Kurosawa, K.2
Tsujii, S.3
-
24
-
-
84955616848
-
Lower bound on the size of shares of nonperfect secret sharing schemes
-
Proceedings of ASIACRYPT '94
-
K. Okada and K. Kurosawa, Lower bound on the size of shares of nonperfect secret sharing schemes, Proceedings of ASIACRYPT '94, Lecture Notes in Comput. Sci., (1995) pp. 33-41.
-
(1995)
Lecture Notes in Comput. Sci.
, pp. 33-41
-
-
Okada, K.1
Kurosawa, K.2
-
25
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Commun. of the ACM, Vol. 22 (1979) pp. 612-613.
-
(1979)
Commun. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
(G. J. Simmons, ed.), IEEE Press
-
G. J. Simmons, An introduction to shared secret and/or shared control schemes and their application, Contemporary Cryptology, The Science of Information Integrity, (G. J. Simmons, ed.), IEEE Press (1992).
-
(1992)
Contemporary Cryptology, the Science of Information Integrity
-
-
Simmons, G.J.1
-
28
-
-
0000708528
-
An explication of secret sharing schemes
-
D. R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 357-390.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
29
-
-
85028945826
-
New general lower bounds on the information rate of secret sharing schemes
-
Advances in Cryptology: CRYPTO '92
-
D. R. Stinson. New general lower bounds on the information rate of secret sharing schemes, Advances in Cryptology: CRYPTO '92, Lecture Notes in Comput. Sci., 740 (1993) pp. 168-182.
-
(1993)
Lecture Notes in Comput. Sci.
, vol.740
, pp. 168-182
-
-
Stinson, D.R.1
-
30
-
-
0028323999
-
Decomposition constructions for secret sharing schemes
-
D. R. Stinson, Decomposition constructions for secret sharing schemes, IEEE Trans. Inform. Theory, Vol. IT-40 (1994) pp. 118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.IT-40
, pp. 118-125
-
-
Stinson, D.R.1
|