-
1
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. R. Blakley, Safeguarding cryptographic keys, AFIPS Conf. Proc. Vol. 48 (1979) pp. 313-317.
-
(1979)
AFIPS Conf. Proc.
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
2
-
-
0001003172
-
Tight bounds on the information rate of secret sharing schemes
-
C. Blundo, A. De Santis, R. De Simone and U. Vaccaro, Tight bounds on the information rate of secret sharing schemes, Designs, Codes Cryptography. Vol. 11 (1997) pp. 107-122.
-
(1997)
Designs, Codes Cryptography.
, vol.11
, pp. 107-122
-
-
Blundo, C.1
De Santis, A.2
De Simone, R.3
Vaccaro, U.4
-
3
-
-
85028751599
-
On the information rate of secret sharing schemes
-
C. Blundo, A. De Santis, L. Gargano and U. Vaccaro, On the information rate of secret sharing schemes. Advances in Cryptology CRYPTO'92, Lecture Notes in Comput. Sci. Vol. 740 pp. 148-167.
-
Advances in Cryptology CRYPTO'92, Lecture Notes in Comput. Sci.
, vol.740
, pp. 148-167
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
4
-
-
0029631974
-
Graph decompositions and secret sharing schemes
-
C. Blundo, A. De Santis, D. R. Stinson and U. Vaccaro, Graph decompositions and secret sharing schemes, J. Cryptol. Vol. 8 (1995) pp. 39-64.
-
(1995)
J. Cryptol.
, vol.8
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
5
-
-
0000354685
-
Some ideal secret sharing schemes
-
E. F. Brickell, Some ideal secret sharing schemes, J. Comb. Math. Comb. Comput. Vol. 9 (1989) pp. 105-113.
-
(1989)
J. Comb. Math. Comb. Comput.
, vol.9
, pp. 105-113
-
-
Brickell, E.F.1
-
6
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptol. Vol. 4 (1991) pp. 123-134.
-
(1991)
J. Cryptol.
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
7
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. F. Brickell, D. R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptol. Vol. 5 (1992) pp. 153-166.
-
(1992)
J. Cryptol.
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
8
-
-
0027607213
-
On the size of shares of secret sharing schemes
-
R. M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro, On the size of shares of secret sharing schemes, J. Cryptol. Vol. 6 (1993) pp. 157-168.
-
(1993)
J. Cryptol.
, vol.6
, pp. 157-168
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
9
-
-
0023543848
-
Secret sharing scheme realizing any access structure
-
M. Ito, A. Saito and T. Nishizeki, Secret sharing scheme realizing any access structure, Proc. IEEE Globecom.'Vol 87. (1987) pp. 99-102.
-
(1987)
Proc. IEEE Globecom.
, vol.87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
10
-
-
0013483720
-
Geometric secret sharing schemes and their duals
-
W. A. Jackson and K. M. Martin, Geometric secret sharing schemes and their duals, Designs, Codes Cryptograph. Vol. 4 (1994) pp. 83-95.
-
(1994)
Designs, Codes Cryptograph.
, vol.4
, pp. 83-95
-
-
Jackson, W.A.1
Martin, K.M.2
-
11
-
-
0001652944
-
Perfect secret sharing schemes on five participants
-
W. A. Jackson and K. M. Martin, Perfect secret sharing schemes on five participants, Designs, Codes Cryptograph. Vol. 9 (1996) pp. 267-286.
-
(1996)
Designs, Codes Cryptograph.
, vol.9
, pp. 267-286
-
-
Jackson, W.A.1
Martin, K.M.2
-
12
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
C. Padró and G. Sáez, Secret sharing schemes with bipartite access structure, IEEE Trans. Inform. Theory, Vol. 46, No. 7 (2000) pp. 2596-2604.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, Issue.7
, pp. 2596-2604
-
-
Padró, C.1
Sáez, G.2
-
13
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Commun. ACM, Vol. 22 (1979) pp. 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
IEEE Press
-
G. J. Simmons, An introduction to shared secret and/or shared control schemes and their application, Contemporary Cryptology. The Science of Information Integrity, IEEE Press (1991) pp. 441-497.
-
(1991)
Contemporary Cryptology. The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
15
-
-
0000708528
-
An explication of secret sharing schemes
-
D.R. Stinson, An explication of secret sharing schemes, Design, Codes Cryptograph. Vol. 2 (1992) pp. 357-390.
-
(1992)
Design, Codes Cryptograph.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
16
-
-
0028323999
-
Decomposition constructions for secret-sharing schemes
-
D. R. Stinson, Decomposition constructions for secret-sharing schemes, IEEE Trans. Inform. Theory, Vol. 40 (1994) pp. 118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
|