-
2
-
-
23044531980
-
Size of broadcast in threshold schemes with disenrollment
-
S. Barwick, W.-A. Jackson, K.M. Martin and P.R. Wild, Size of broadcast in threshold schemes with disenrollment, Information Security and Privacy, ACISP 2002, LNCS, 2384 (2002) 71-88.
-
(2002)
Information Security and Privacy, ACISP 2002, LNCS
, vol.2384
, pp. 71-88
-
-
Barwick, S.1
Jackson, W.-A.2
Martin, K.M.3
Wild, P.R.4
-
6
-
-
55449118914
-
Enciphered geometry: Some applications of geometry to cryptography
-
A. Beutelspacher, Enciphered geometry: some applications of geometry to cryptography, Annals Discr. Math. 37 (1988) 59-68.
-
(1988)
Annals Discr. Math.
, vol.37
, pp. 59-68
-
-
Beutelspacher, A.1
-
8
-
-
0346227016
-
Applications of finite geometry to cryptography
-
Codes and Cryptography, CISM Courses and Lecture Notes 313, Springer Verlag
-
A. Beutelspacher, Applications of finite geometry to cryptography, Geometries, in: Codes and Cryptography, CISM Courses and Lecture Notes 313, Springer Verlag, 1990, pp. 161-186.
-
(1990)
Geometries
, pp. 161-186
-
-
Beutelspacher, A.1
-
9
-
-
33947514080
-
Geometric structures as threshold schemes
-
H.J. Beker and F.C. Piper, Eds., Oxford University Press
-
A. Beutelspacher and K. Vedder, Geometric structures as threshold schemes, in: Cryptography and Coding, H.J. Beker and F.C. Piper, Eds., Oxford University Press, 1989, pp. 255-268.
-
Cryptography and Coding
, vol.1989
, pp. 255-268
-
-
Beutelspacher, A.1
Vedder, K.2
-
10
-
-
55449130469
-
Die bedeutung von shared secret schemes als mechanisms zur realisierung von sicherheitsfunktionen in informationstechnischen systemen
-
A. Beutelspacher and A. Kersten, Die Bedeutung von shared secret schemes als Mechanisms zur Realisierung von Sicherheitsfunktionen in Informationstechnischen Systemen, Datenschutz und Datensicherung 9 (1993) 498-510.
-
(1993)
Datenschutz und Datensicherung
, vol.9
, pp. 498-510
-
-
Beutelspacher, A.1
Kersten, A.2
-
15
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly-secure key distribution for dynamic conferences, Adv. in Cryptology - CRYPTO '92, Lecture Notes in Comput. Sci. 740 (1993) 471-486.
-
(1993)
Adv. in Cryptology - CRYPTO '92, Lecture Notes in Comput. Sci.
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
16
-
-
85005949623
-
Multi-secret sharing schemes
-
C. Blundo, A. De Santis, G. Di Crescenzo, A. Giorgio Gaggia and U. Vaccaro, Multi-secret sharing schemes, Adv. in Cryptology - CRYPTO '94, Lecture Notes in Comput. Sci. 839 (1994) 150-163.
-
(1994)
Adv. in Cryptology - CRYPTO '94, Lecture Notes in Comput. Sci.
, vol.839
, pp. 150-163
-
-
Blundo, C.1
De Santis, A.2
Di Crescenzo, G.3
Giorgio Gaggia, A.4
Vaccaro, U.5
-
17
-
-
0029631974
-
Graph decompositions and secret sharing schemes
-
C. Blundo, A. De Santis, D. Stinson and U. Vaccaro, Graph decompositions and secret sharing schemes, J. Cryptology 8 (1995) 39-64.
-
(1995)
J. Cryptology
, vol.8
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.3
Vaccaro, U.4
-
18
-
-
0029277778
-
New bounds on the information rate of secret sharing schemes
-
C. Blundo, A. De Santis, A. Gaggia and U. Vaccaro, New bounds on the information rate of secret sharing schemes, IEEE Trans. Inf. Th. 41 (1995) 549-554.
-
(1995)
IEEE Trans. Inf. Th.
, vol.41
, pp. 549-554
-
-
Blundo, C.1
De Santis, A.2
Gaggia, A.3
Vaccaro, U.4
-
19
-
-
0013546220
-
On the dealer's randomness required in secret sharing schemes
-
C. Blundo, A. Gaggia and D.R. Stinson, On the dealer's randomness required in secret sharing schemes, Des. Codes Cryptogr. 11 (1997) 235-259.
-
(1997)
Des. Codes Cryptogr.
, vol.11
, pp. 235-259
-
-
Blundo, C.1
Gaggia, A.2
Stinson, D.R.3
-
21
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E.F. Brickell and D.M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology 2 (1991) 123-134.
-
(1991)
J. Cryptology
, vol.2
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
22
-
-
0005167951
-
The detection of cheaters in threshold schemes
-
E.F. Brickell and D.R. Stinson, The detection of cheaters in threshold schemes, SLAM J. of Disc. Math. 4 (1991) 502-510.
-
(1991)
SLAM J. of Disc. Math.
, vol.4
, pp. 502-510
-
-
Brickell, E.F.1
Stinson, D.R.2
-
23
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R.M. Capocelli, A. De Santis, Gargano, and U. Vaccaro, On the size of shares for secret sharing schemes, J. Cryptology 6 (1993), 157-169.
-
(1993)
J. Cryptology
, vol.6
, pp. 157-169
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano3
Vaccaro, U.4
-
24
-
-
0013482322
-
A note on secret sharing schemes
-
Springer Verlag
-
R.M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro, A note on secret sharing schemes, in: Sequences II: Methods in Communications, Security and Computer Science, Springer Verlag, 1993, pp. 335-344.
-
(1993)
Sequences II: Methods in Communications, Security and Computer Science
, pp. 335-344
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
25
-
-
0001476931
-
A perfect threshold secret sharing scheme to identify cheaters
-
M. Carpentieri, A perfect threshold secret sharing scheme to identify cheaters, Des. Codes Cryptogr. 5 (1995) 183-188.
-
(1995)
Des. Codes Cryptogr.
, vol.5
, pp. 183-188
-
-
Carpentieri, M.1
-
29
-
-
0001522694
-
On the information rate of perfect secret sharing schemes
-
M. van Dijk, On the information rate of perfect secret sharing schemes, Des. Codes Cryptogr. 6 (1995) 143-169.
-
(1995)
Des. Codes Cryptogr.
, vol.6
, pp. 143-169
-
-
Van Dijk, M.1
-
30
-
-
0141948319
-
A general decomposition construction for incomplete secret sharing schemes
-
M. van Dijk, W.-A. Jackson and K.M. Martin, A general decomposition construction for incomplete secret sharing schemes, Des. Codes Cryptogr. 15 (1998) 301-321.
-
(1998)
Des. Codes Cryptogr.
, vol.15
, pp. 301-321
-
-
Van Dijk, M.1
Jackson, W.-A.2
Martin, K.M.3
-
33
-
-
0027289776
-
Secret sharing schemes realizing general access structure
-
M. Ito, A. Saito and T. Nishizeki, Secret sharing schemes realizing general access structure, J. Cryptology 6 (1993) 15-20.
-
(1993)
J. Cryptology
, vol.6
, pp. 15-20
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
34
-
-
0013483720
-
Geometric secret sharing schemes and their duals
-
W.-A. Jackson and K.M. Martin, Geometric secret sharing schemes and their duals, Des. Codes Cryptogr. 4 (1994) 83-95.
-
(1994)
Des. Codes Cryptogr.
, vol.4
, pp. 83-95
-
-
Jackson, W.-A.1
Martin, K.M.2
-
36
-
-
0032217850
-
An algorithm for efficient geometric secret sharing schemes
-
W.-A. Jackson and K.M. Martin, An Algorithm for efficient geometric secret sharing schemes, Utilitas Mathematica 54 (1998) 127-150.
-
(1998)
Utilitas Mathematica
, vol.54
, pp. 127-150
-
-
Jackson, W.-A.1
Martin, K.M.2
-
37
-
-
0001652944
-
Perfect secret sharing schemes on five participants
-
W.-A. Jackson and K.M. Martin, Perfect secret sharing schemes on five participants, Des. Codes Cryptogr. 9 (1996) 267-286.
-
(1996)
Des. Codes Cryptogr.
, vol.9
, pp. 267-286
-
-
Jackson, W.-A.1
Martin, K.M.2
-
38
-
-
0006544582
-
A combinatorial exposition of ramp schemes
-
W.-A. Jackson and K.M. Martin, A combinatorial exposition of ramp schemes, Australas. J. Combin. 14 (1996) 51-60.
-
(1996)
Australas. J. Combin.
, vol.14
, pp. 51-60
-
-
Jackson, W.-A.1
Martin, K.M.2
-
39
-
-
84966614707
-
Multisecret threshold schemes
-
W.-A. Jackson, K.M. Martin and C.M. O'Keefe, Multisecret threshold schemes, Adv. in Cryptology - CRYPTO '93, Lecture Notes in Comput. Sci. 773 (1994) 126-135.
-
(1994)
Adv. in Cryptology - CRYPTO '93, Lecture Notes in Comput. Sci.
, vol.773
, pp. 126-135
-
-
Jackson, W.-A.1
Martin, K.M.2
O'Keefe, C.M.3
-
41
-
-
0342890136
-
Mutually trusted authority free secret sharing schemes
-
W.-A. Jackson, K.M. Martin, and C.M. O'Keefe, Mutually trusted authority free secret sharing schemes, J. Cryptology 10 (1997) 261-289.
-
(1997)
J. Cryptology
, vol.10
, pp. 261-289
-
-
Jackson, W.-A.1
Martin, K.M.2
O'Keefe, C.M.3
-
44
-
-
33747469206
-
Changing thresholds in the absence of secure channels
-
K.M. Martin, J. Pieprzyk, R. Safavi-Naini and H. Wang, Changing thresholds in the absence of secure channels, Australian Computer Journal 31 (1999) 34-43.
-
(1999)
Australian Computer Journal
, vol.31
, pp. 34-43
-
-
Martin, K.M.1
Pieprzyk, J.2
Safavi-Naini, R.3
Wang, H.4
-
45
-
-
0345884729
-
Matroid representations by partitions
-
F. Matùs, Matroid Representations by Partitions, Discrete Mathematics 203 (1999) 169-194.
-
(1999)
Discrete Mathematics
, vol.203
, pp. 169-194
-
-
Matùs, F.1
-
48
-
-
55449136106
-
A representation of a family of secret sharing matroids
-
to appear
-
S.-L. Ng, A representation of a family of secret sharing matroids, to appear in Des. Codes Cryptogr.
-
Des. Codes Cryptogr.
-
-
Ng, S.-L.1
-
49
-
-
0035452614
-
On the composition of matroids and ideal secret sharing schemes
-
S.-L. Ng and M. Walker, On the composition of matroids and ideal secret sharing schemes, Des. Codes Cryptogr. 24 (2001) 49-67.
-
(2001)
Des. Codes Cryptogr.
, vol.24
, pp. 49-67
-
-
Ng, S.-L.1
Walker, M.2
-
51
-
-
0002828874
-
Key distribution patterns using Minkowski planes
-
C.M. O'Keefe, Key distribution patterns using Minkowski planes, Des. Codes Cryptogr. 5 (1995), 261-267.
-
(1995)
Des. Codes Cryptogr.
, vol.5
, pp. 261-267
-
-
O'Keefe, C.M.1
-
55
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM 22 (1979) 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
56
-
-
0005180192
-
Robust shared secret schemes or 'how to be sure you have the right answer even though you don't know the question'
-
G.J. Simmons, Robust shared secret schemes or 'how to be sure you have the right answer even though you don't know the question', Congr. Numer. 68 (1989) 215-248.
-
(1989)
Congr. Numer.
, vol.68
, pp. 215-248
-
-
Simmons, G.J.1
-
61
-
-
0003038453
-
An introduction to shared secret/shared control schemes
-
G.J. Simmons, ed., IEEE Press, New York
-
G.J. Simmons, An introduction to shared secret/shared control schemes, in: G.J. Simmons, ed., Contemporary Cryptology - The science of information integrity, IEEE Press, New York, 1992.
-
(1992)
Contemporary Cryptology - The Science of Information Integrity
-
-
Simmons, G.J.1
-
63
-
-
0025212061
-
The combinatorics of authentication and secrecy codesz
-
D.R. Stinson, The combinatorics of authentication and secrecy codesz, J. Cryptology 2 (1990) 23-49.
-
(1990)
J. Cryptology
, vol.2
, pp. 23-49
-
-
Stinson, D.R.1
-
64
-
-
0000708528
-
An explication of secret sharing schemes
-
D.R. Stinson, An explication of secret sharing schemes, Des. Codes Cryptogr. 2 (1992) 357-390.
-
(1992)
Des. Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
65
-
-
0028323999
-
Decomposition constructions for secret sharing schemes
-
D.R. Stinson, Decomposition constructions for secret sharing schemes, IEEE Trans. Inf. Th. 40 (1994) 118-125.
-
(1994)
IEEE Trans. Inf. Th.
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
-
67
-
-
0029211714
-
A geometric approach for sharing secrets
-
T.-C. Wu and W.-H. He, A geometric approach for sharing secrets, Computers and Security 14 (1995) 135-146.
-
(1995)
Computers and Security
, vol.14
, pp. 135-146
-
-
Wu, T.-C.1
He, W.-H.2
|