-
2
-
-
85028918825
-
Threshold schemes with disenrollment
-
B. Blakley, G.R. Blakley, A.H. Chan and J.L. Massey. Threshold schemes with disenrollment. In Advances in Cryptology - CRYPTO’92, LNCS 740 Springer-Verlag, Berlin (1993) 540–548.
-
(1993)
Advances in Cryptology - CRYPTO’92, LNCS 740 Springer-Verlag, Berlin
, pp. 540-548
-
-
Blakley, B.1
Blakley, G.R.2
Chan, A.H.3
Massey, J.L.4
-
3
-
-
84996527783
-
Fully dynamic secret sharing schemes
-
C. Blundo, A. Cresti, A. De Santis and U. Vaccaro. Fully dynamic secret sharing schemes. In Advances in Cryptology – CRYPTO’93, LNCS 773, Springer, Berlin (1993) 110–125.
-
(1993)
Advances in Cryptology – CRYPTO’93, LNCS 773, Springer, Berlin
, pp. 110-125
-
-
Blundo, C.1
Cresti, A.2
De Santis, A.3
Vaccaro, U.4
-
8
-
-
84961340536
-
Changing thresholds in the absence of secure channels
-
K.M. Martin, J. Pieprzyk, R. Safavi-Naini and H. Wang. Changing thresholds in the absence of secure channels. In Information Security and Privacy – ACISP’99, LNCS 1587, Springer, Berlin (1999) 177–191.
-
(1999)
Information Security and Privacy – ACISP’99, LNCS 1587, Springer, Berlin
, pp. 177-191
-
-
Martin, K.M.1
Pieprzyk, J.2
Safavi-Naini, R.3
Wang, H.4
-
9
-
-
0033351734
-
Bounds and techniques for efficient redistribution of secret shares to new access structures
-
K.M. Martin, R. Safavi-Naini and H. Wang. Bounds and techniques for efficient redistribution of secret shares to new access structures. The Computer Journal, 42, No.8 (1999) 638–649.
-
(1999)
The Computer Journal
, vol.42
, Issue.8
, pp. 638-649
-
-
Martin, K.M.1
Safavi-Naini, R.2
Wang, H.3
-
10
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22 (1979) 612–613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
11
-
-
84890522850
-
Communication theory of secrecy systems. Bell System Tech
-
C.E. Shannon. Communication theory of secrecy systems. Bell System Tech. Journal, 28 (1949) 656–715.
-
(1949)
Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
12
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
G. J. Simmons. An introduction to shared secret and/or shared control schemes and their application. In Contemporary Cryptology, 441–497. IEEE Press, (1991).
-
(1991)
Contemporary Cryptology, 441–497. IEEE Press
-
-
Simmons, G.J.1
-
13
-
-
0000708528
-
An explication of secret sharing schemes. Des
-
D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr., 2 (1992) 357–390.
-
(1992)
Codes Cryptogr
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
14
-
-
84947480433
-
-
Y. Tamura, M. Tada and E. Okamoto. Update of access structure in Shamir’s (k, n)-threshold scheme. Proceedings of The 1999 Symposium on Cryptography and Information Security, Kobe, Japan, January 26–29, (1999).
-
(1999)
Update of Access Structure in Shamir’s (K, N)-Threshold Scheme. Proceedings of the 1999 Symposium on Cryptography and Information Security, Kobe, Japan, January
, vol.2629
-
-
Tamura, Y.1
Tada, M.2
Okamoto, E.3
|