-
1
-
-
0028429265
-
Universally ideal secret sharing schemes
-
A. Beimel and B. Chor. Universally ideal secret sharing schemes. IEEE Trans. on Information Theory, 40(3):786-794, 1994.
-
(1994)
IEEE Trans. on Information Theory
, vol.40
, Issue.3
, pp. 786-794
-
-
Beimel, A.1
Chor, B.2
-
2
-
-
33645595978
-
Characterizing ideal weighted threshold secret sharing
-
Dept. of Computer Science, Ben-Gurion University
-
A. Beimel, T. Tassa, and E. Weinreb. Characterizing ideal weighted threshold secret sharing. Technical Report 04-05, Dept. of Computer Science, Ben-Gurion University, 2004. Available at: www.cs.bgu.ac.il/~beimel/pub.html.
-
(2004)
Technical Report
, vol.4
, Issue.5
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computations
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computations. In 20th STOC, 1-10, 1988.
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
CRYPTO'88
-
J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In CRYPTO'88, volume 403 of LNCS, pages 27-35. 1990.
-
(1990)
LNCS
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
8
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. Brickell and D. M. Davenport. On the classification of ideal secret sharing schemes. J. of Cryptology, 4(73):123-134, 1991.
-
(1991)
J. of Cryptology
, vol.4
, Issue.73
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
9
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. F. Brickell and D. R. Stinson. Some improved bounds on the information rate of perfect secret sharing schemes. J. of Cryptology, 5(3):153-166, 1992.
-
(1992)
J. of Cryptology
, vol.5
, Issue.3
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
10
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro. On the size of shares for secret sharing schemes. J. of Cryptology, 6(3):157-168, 1993.
-
(1993)
J. of Cryptology
, vol.6
, Issue.3
, pp. 157-168
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
12
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
EUROCRYPT 2000
-
R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In EUROCRYPT 2000, volume 1807 of LNCS, pages 316-334. 2000.
-
(2000)
LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
13
-
-
85022187530
-
Shared generation of authenticators and signatures
-
CRYPTO'91
-
Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In CRYPTO'91, volume 576 of LNCS, pages 457-469. 1992.
-
(1992)
LNCS
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
14
-
-
0023543848
-
Secret sharing schemes realizing general access structure
-
M. Ito, A. Saito, and T. Nishizeki. Secret sharing schemes realizing general access structure. In Proc. of Globecom 87, pages 99-102, 1987.
-
(1987)
Proc. of Globecom 87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
15
-
-
0013229183
-
Ideal secret sharing schemes with multiple secrets
-
W. Jackson, K. M. Martin, and C. M. O'Keefe. Ideal secret sharing schemes with multiple secrets. J. of Cryptology, 9(4):233-250, 1996.
-
(1996)
J. of Cryptology
, vol.9
, Issue.4
, pp. 233-250
-
-
Jackson, W.1
Martin, K.M.2
O'Keefe, C.M.3
-
17
-
-
0020543282
-
On secret sharing systems
-
E. D. Karnin, J. W. Greene, and M. E. Hellman. On secret sharing systems. IEEE Trans. on Information Theory, 29(1):35-41, 1983.
-
(1983)
IEEE Trans. on Information Theory
, vol.29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
18
-
-
33645601443
-
Secret sharing schemes on access structures with intersection number equal to one
-
3rd SCN
-
J. Martí-Farré and C. Padró. Secret sharing schemes on access structures with intersection number equal to one. 3rd SCN, vol. 2576 of LNCS, pp. 354-363. 2002.
-
(2002)
LNCS
, vol.2576
, pp. 354-363
-
-
Martí-Farré, J.1
Padró, C.2
-
21
-
-
0033591581
-
Weighted threshold secret sharing schemes
-
P. Morillo, C. Padró, G. Sáez, and J. L. Villa. Weighted threshold secret sharing schemes. Inform. Process. Lett., 70(5):211-216, 1999.
-
(1999)
Inform. Process. Lett.
, vol.70
, Issue.5
, pp. 211-216
-
-
Morillo, P.1
Padró, C.2
Sáez, G.3
Villa, J.L.4
-
23
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
C. Padró and G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Trans. on Information Theory, 46:2596-2605, 2000.
-
(2000)
IEEE Trans. on Information Theory
, vol.46
, pp. 2596-2605
-
-
Padró, C.1
Sáez, G.2
-
27
-
-
84898132112
-
How to (really) share a secret
-
CRYPTO'88
-
G. J. Simmons. How to (really) share a secret. In CRYPTO'88, volume 403 of LNCS, pages 390-448. 1990.
-
(1990)
LNCS
, vol.403
, pp. 390-448
-
-
Simmons, G.J.1
-
28
-
-
0003038453
-
An introduction to shared secret and/or shared control and their application
-
IEEE Press
-
G. J. Simmons. An introduction to shared secret and/or shared control and their application. In Contemporary Cryptology, The Science of Information Integrity, pages 441-497. IEEE Press, 1992.
-
(1992)
Contemporary Cryptology, The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
31
-
-
0000708528
-
An explication of secret sharing schemes
-
D. R. Stinson. An explication of secret sharing schemes. Designs, Codes and Cryptography, 2:357-390, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
32
-
-
85028945826
-
New general lower bounds on the information rate of secret sharing schemes
-
CRYPTO'92
-
D. R. Stinson. New general lower bounds on the information rate of secret sharing schemes. In CRYPTO'92, volume 740 of LNCS, pages 168-182. 1993.
-
(1993)
LNCS
, vol.740
, pp. 168-182
-
-
Stinson, D.R.1
-
33
-
-
35048827923
-
Hierarchical threshold secret sharing
-
M. Naor, editor, First Theory of Cryptography Conference, TCC 2004
-
T. Tassa. Hierarchical threshold secret sharing. In M. Naor, editor, First Theory of Cryptography Conference, TCC 2004, volume 2951 of LNCS, pages 473-490. 2004.
-
(2004)
LNCS
, vol.2951
, pp. 473-490
-
-
Tassa, T.1
|