메뉴 건너뛰기




Volumn 2384, Issue , 2002, Pages 71-88

Size of broadcast in threshold schemes with disenrollment

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 23044531980     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45450-0_6     Document Type: Conference Paper
Times cited : (6)

References (14)
  • 9
    • 0033351734 scopus 로고    scopus 로고
    • Bounds and techniques for efficient redistribution of secret shares to new access structures
    • K.M. Martin, R. Safavi-Naini and H. Wang. Bounds and techniques for efficient redistribution of secret shares to new access structures. The Computer Journal, 42, No.8 (1999) 638–649.
    • (1999) The Computer Journal , vol.42 , Issue.8 , pp. 638-649
    • Martin, K.M.1    Safavi-Naini, R.2    Wang, H.3
  • 10
  • 11
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems. Bell System Tech
    • C.E. Shannon. Communication theory of secrecy systems. Bell System Tech. Journal, 28 (1949) 656–715.
    • (1949) Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 12
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application
    • G. J. Simmons. An introduction to shared secret and/or shared control schemes and their application. In Contemporary Cryptology, 441–497. IEEE Press, (1991).
    • (1991) Contemporary Cryptology, 441–497. IEEE Press
    • Simmons, G.J.1
  • 13
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes. Des
    • D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr., 2 (1992) 357–390.
    • (1992) Codes Cryptogr , vol.2 , pp. 357-390
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.