-
2
-
-
0040113669
-
Superpolynomial lower bounds for monotone span programs
-
L. BABAI, A. GÁL, AND A. WIGDERSON, Superpolynomial lower bounds for monotone span programs, Combinatorica, 19 (1999), pp. 301-319.
-
(1999)
Combinatorica
, vol.19
, pp. 301-319
-
-
Babai, L.1
Gál, A.2
Wigderson, A.3
-
3
-
-
0003372863
-
Algorithmic number theory
-
MIT Press, Cambridge, MA
-
E. BACH AND J. SHALIT, Algorithmic Number Theory, Vol. 1. Efficient Algorithms, MIT Press, Cambridge, MA, 1996.
-
(1996)
Efficient Algorithms
, vol.1
-
-
Bach, E.1
Shalit, J.2
-
4
-
-
84957652167
-
General short computational secret sharing schemes
-
Advances in Cryptology - EUROCRYPT '95, L. C. Guillou and J. J. Quisquater, eds., Springer-Verlag, Berlin
-
P. BEGUIN AND A. CRESTI, General short computational secret sharing schemes, in Advances in Cryptology - EUROCRYPT '95, L. C. Guillou and J. J. Quisquater, eds., Lect. Notes in Comput. Sci. 921, Springer-Verlag, Berlin, 1995, pp. 194-208.
-
(1995)
Lect. Notes in Comput. Sci.
, vol.921
, pp. 194-208
-
-
Beguin, P.1
Cresti, A.2
-
5
-
-
0033873381
-
Circuits over PP and PL
-
R. BEIGEL AND B. FU, Circuits over PP and PL, J. Comput. Syst. Sci., 60 (2000), pp. 422-441.
-
(2000)
J. Comput. Syst. Sci.
, vol.60
, pp. 422-441
-
-
Beigel, R.1
Fu, B.2
-
7
-
-
0003745894
-
-
Ph.D. thesis, Technion-Israel Institute of Technology, Haifa, Israel
-
A. BEIMEL, Secure Schemes for Secret Sharing and Key Distribution, Ph.D. thesis, Technion-Israel Institute of Technology, Haifa, Israel, 1996.
-
(1996)
Secure Schemes for Secret Sharing and Key Distribution
-
-
Beimel, A.1
-
8
-
-
0040304685
-
Lower bounds for monotone span programs
-
Conference version: FOCS '95
-
A. BEIMEL, A. GAL, AND M. PATERSON, Lower bounds for monotone span programs, Comput. Complexity, 6 (1996/1997), pp. 29-45. Conference version: FOCS '95.
-
(1996)
Comput. Complexity
, vol.6
, pp. 29-45
-
-
Beimel, A.1
Gal, A.2
Paterson, M.3
-
9
-
-
0345412672
-
Separating the power of monotone span programs over different fields
-
Cambridge, MA
-
A. BEIMEL AND E. WEINREB, Separating the power of monotone span programs over different fields, in Proceeding of the 44th Annual IEEE Symposium on Foundations of Computer Science, Cambridge, MA, 2003, pp. 428-437.
-
(2003)
Proceeding of the 44th Annual IEEE Symposium on Foundations of Computer Science
, pp. 428-437
-
-
Beimel, A.1
Weinreb, E.2
-
10
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
Chicago, IL
-
M. BEN-OR, S. GOLDWASSER, AND A. WIGDERSON, Completeness theorems for noncryptographic fault-tolerant distributed computations, in Proceedings of the 20th Annual ACM Symposium on the Theory of Computing, Chicago, IL, 1988, pp. 1-10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
11
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
Advances in Cryptology - CRYPTO '88, S. Goldwasser, ed., Springer-Verlag, Berlin
-
J. BENALOH AND J. LEICHTER, Generalized secret sharing and monotone functions, in Advances in Cryptology - CRYPTO '88, S. Goldwasser, ed., Lect. Notes in Comput. Sci. 403, Springer-Verlag, Berlin, 1990, pp. 27-35.
-
(1990)
Lect. Notes in Comput. Sci.
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
12
-
-
33644609587
-
-
Private communication
-
J. BENALOH AND S. RUDICH, Private communication, 1989.
-
(1989)
-
-
Benaloh, J.1
Rudich, S.2
-
13
-
-
0021388907
-
On computing the determinant in small parallel time using a small number of processors
-
S. J. BERKOWITZ, On computing the determinant in small parallel time using a small number of processors, Inform. Process. Lett., 18 (1984), pp. 147-150.
-
(1984)
Inform. Process. Lett.
, vol.18
, pp. 147-150
-
-
Berkowitz, S.J.1
-
14
-
-
84984804645
-
A construction of practical secret sharing schemes using linear block codes
-
Advances in Cryptology - AUSCRYPT '92, J. Seberry and Y. Zheng, eds., Springer-Verlag, Berlin
-
M. BERTILSSON AND I. INGEMARSSON, A construction of practical secret sharing schemes using linear block codes, in Advances in Cryptology - AUSCRYPT '92, J. Seberry and Y. Zheng, eds., Lect. Notes Comput. Sci. 718, Springer-Verlag, Berlin, 1993, pp. 67-79.
-
(1993)
Lect. Notes Comput. Sci.
, vol.718
, pp. 67-79
-
-
Bertilsson, M.1
Ingemarsson, I.2
-
15
-
-
85062838317
-
Safeguarding cryptographic keys
-
Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, eds., AFIPS Press, Arlington, VA
-
G. R. BLAKLEY, Safeguarding cryptographic keys, in Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, eds., Vol. 48 of AFIPS Conference Proceedings, AFIPS Press, Arlington, VA, 1979, pp. 313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
16
-
-
0030569864
-
On the information rate of secret sharing schemes
-
C. BLUNDO, A. DE SANTIS, L. GARGANO, AND U. VACCARO, On the information rate of secret sharing schemes, Theoret. Comput. Sci., 154 (1996), pp. 283-306.
-
(1996)
Theoret. Comput. Sci.
, vol.154
, pp. 283-306
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
17
-
-
84974588386
-
Timed commitments
-
Advances in Cryptology - CRYPTO 2000, M. Bellare, ed., Springer-Verlag, Berlin
-
D. BONEH AND M. NAOR, Timed commitments, in Advances in Cryptology - CRYPTO 2000, M. Bellare, ed., Lect. Notes Comput. Sci. 1880, Springer-Verlag, Berlin, 2000, pp. 236-254.
-
(2000)
Lect. Notes Comput. Sci.
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
18
-
-
0020097420
-
Fast parallel matrix and GCD computations
-
A. BORODIN, J. VON ZUR. GATHEN, AND J. HOPCROFT, Fast parallel matrix and GCD computations, Inform. Control, 52 (1982), pp. 241-256.
-
(1982)
Inform. Control
, vol.52
, pp. 241-256
-
-
Borodin, A.1
Von Zur Gathen, J.2
Hopcroft, J.3
-
20
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. BRICKELL AND D. M. DAVENPORT, On the classification of ideal secret sharing schemes, J. Cryptology, 4 (1991), pp. 123-134.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
21
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. F. BRICKELL AND D. R. STINSON, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, 5 (1992), pp. 153-166.
-
(1992)
J. Cryptology
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
22
-
-
0004109958
-
Structure and importance of the logspace-mod class
-
G. BUNTROCK, C. DAMM, U. HERTRAMPF, AND C. MEINEL, Structure and importance of the logspace-mod class, Math. Systems Theory, 25 (1992), pp. 223-237.
-
(1992)
Math. Systems Theory
, vol.25
, pp. 223-237
-
-
Buntrock, G.1
Damm, C.2
Hertrampf, U.3
Meinel, C.4
-
23
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R. M. CAPOCELLI, A. DE SANTIS, L. GARGANO, AND U. VACCARO, On the size of shares for secret sharing schemes, J. Cryptology, 6 (1993), pp. 157-168.
-
(1993)
J. Cryptology
, vol.6
, pp. 157-168
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
24
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Chicago, IL
-
D. CHAUM, C. CRÉPEAU, AND I. DAMGÅRD, Multiparty unconditionally secure protocols, in Proceedings of the 20th Annual ACM Symposium on the Theory of Computing, Chicago, IL, 1988, pp. 11-19.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
25
-
-
0025224351
-
An improved parallel algorithm for integer GCD
-
B. CHOR AND O. GOLDREICH, An improved parallel algorithm for integer GCD, Algorithmica, 5 (1990), pp. 1-10.
-
(1990)
Algorithmica
, vol.5
, pp. 1-10
-
-
Chor, B.1
Goldreich, O.2
-
26
-
-
0020495011
-
A taxonomy of problems with fast parallel algorithms
-
S. A. COOK, A taxonomy of problems with fast parallel algorithms, Inform. Control, 64 (1985), pp. 2-22.
-
(1985)
Inform. Control
, vol.64
, pp. 2-22
-
-
Cook, S.A.1
-
27
-
-
0033706246
-
On the complexity of verifiable secret sharing and multiparty computation
-
New York
-
R. CRAMER, I. DAMGARD, AND S. DZIEMBOWSKI, On the complexity of verifiable secret sharing and multiparty computation, in Proceedings of the 32nd Annual ACM Symposium on the Theory of Computing, New York, 2000, pp. 325-334.
-
(2000)
Proceedings of the 32nd Annual ACM Symposium on the Theory of Computing
, pp. 325-334
-
-
Cramer, R.1
Damgard, I.2
Dziembowski, S.3
-
28
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
Advances in Cryptology - EUROCRYPT 2000, B. Preneel, ed., Springer-Verlag, Berlin
-
R. CRAMER, I. DAMGÅRD, AND U. MAURER, General secure multi-party computation from any linear secret-sharing scheme, in Advances in Cryptology - EUROCRYPT 2000, B. Preneel, ed., Lect. Notes Comput. Sci. 1807, Springer-Verlag, Berlin, 2000, pp. 316-334.
-
(2000)
Lect. Notes Comput. Sci.
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
29
-
-
0004020725
-
The dealer's random bits in perfect secret sharing schemes
-
L. CSIRMAZ, The dealer's random bits in perfect secret sharing schemes, Studia Sci. Math. Hungar., 32 (1996), pp. 429-437.
-
(1996)
Studia Sci. Math. Hungar.
, vol.32
, pp. 429-437
-
-
Csirmaz, L.1
-
30
-
-
0001607361
-
The size of a share must be large
-
L. CSIRMAZ, The size of a share must be large, J. Cryptology, 10 (1997), pp. 223-231.
-
(1997)
J. Cryptology
, vol.10
, pp. 223-231
-
-
Csirmaz, L.1
-
31
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Advances in Cryptology - CRYPTO '91, J. Feigenbaum, ed., Springer-Verlag, Berlin
-
Y. DESMEDT AND Y. FRANKEL, Shared generation of authenticators and signatures, in Advances in Cryptology - CRYPTO '91, J. Feigenbaum, ed., Lect. Notes Comput. Sci. 576, Springer-Verlag, Berlin, 1992, pp. 457-469.
-
(1992)
Lect. Notes Comput. Sci.
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
32
-
-
0000527282
-
Homomorphic zero-knowledge threshold schemes over any finite abelian group
-
Y. DESMEDT AND Y. FRANKEL, Homomorphic zero-knowledge threshold schemes over any finite abelian group, SIAM J. Discrete Math., 7 (1994), pp. 667-679.
-
(1994)
SIAM J. Discrete Math.
, vol.7
, pp. 667-679
-
-
Desmedt, Y.1
Frankel, Y.2
-
33
-
-
0001522694
-
On the information rate of perfect secret sharing schemes
-
M. v. DIJK, On the information rate of perfect secret sharing schemes, Des. Codes Cryptogr., 6 (1995), pp. 143-169.
-
(1995)
Des. Codes Cryptogr.
, vol.6
, pp. 143-169
-
-
Dijk, M.V.1
-
34
-
-
0003944144
-
A linear construction of secret sharing schemes
-
M. v. DIJK, A linear construction of secret sharing schemes, Des. Codes Cryptogr., 12 (1997), pp. 161-201.
-
(1997)
Des. Codes Cryptogr.
, vol.12
, pp. 161-201
-
-
Dijk, M.V.1
-
35
-
-
0032185250
-
Efficient algorithms for computing the Jacobi symbol
-
S. M. EIKENBERRY AND J. P. SORENSON, Efficient algorithms for computing the Jacobi symbol, J. Symb. Comput., 26 (1998), pp. 509-523.
-
(1998)
J. Symb. Comput.
, vol.26
, pp. 509-523
-
-
Eikenberry, S.M.1
Sorenson, J.P.2
-
36
-
-
4244075938
-
-
Master's thesis, ETH Zurich, Zurich, Switzerland
-
S. FEHR, Span Programs Over Rings and How to Share a Secret from a Module, Master's thesis, ETH Zurich, Zurich, Switzerland, 1998.
-
(1998)
Span Programs over Rings and How to Share a Secret from a Module
-
-
Fehr, S.1
-
37
-
-
0027986369
-
A minimal model for secure computation
-
Montreal
-
U. FEIGE, J. KILIAN, AND M. NAOR, A minimal model for secure computation, in Proceedings of the 26th Annual ACM Symposium on the Theory of Computing, Montreal, 1994, pp. 554-563.
-
(1994)
Proceedings of the 26th Annual ACM Symposium on the Theory of Computing
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
38
-
-
0031623892
-
A characterization of span program size and improved lower bounds for monotone span programs
-
Dallas
-
A. GAL, A characterization of span program size and improved lower bounds for monotone span programs, in Proceedings of the 30th Annual ACM Symposium on the Theory of Computing, Dallas, 1998, pp. 429-437.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on the Theory of Computing
, pp. 429-437
-
-
Gal, A.1
-
39
-
-
0002711066
-
The monotone and planar circuit value problem is complete for P
-
L. GOLDSCHLAGER, The monotone and planar circuit value problem is complete for P, SIGACT News, 9 (1977), pp. 25-27.
-
(1977)
SIGACT News
, vol.9
, pp. 25-27
-
-
Goldschlager, L.1
-
41
-
-
0000490812
-
A survey of fast exponentiation methods
-
D. M. GORDON, A survey of fast exponentiation methods, J. Algorithms, 27 (1998), pp. 129-146.
-
(1998)
J. Algorithms
, vol.27
, pp. 129-146
-
-
Gordon, D.M.1
-
42
-
-
0004003953
-
The shrinkage exponent of de Morgan formulas is 2
-
J. HÅSTAD, The shrinkage exponent of De Morgan formulas is 2, SIAM J. Comput., 27 (1998), pp. 48-64.
-
(1998)
SIAM J. Comput.
, vol.27
, pp. 48-64
-
-
Håstad, J.1
-
43
-
-
0030718794
-
Private simultaneous messages protocols with applications
-
Ramat-Gan, Israel
-
Y. ISHAI AND E. KUSHILEVITZ, Private simultaneous messages protocols with applications, in 5th Israel Symposium on Theory of Computing and Systems, Ramat-Gan, Israel, 1997, pp. 174-183.
-
(1997)
5th Israel Symposium on Theory of Computing and Systems
, pp. 174-183
-
-
Ishai, Y.1
Kushilevitz, E.2
-
44
-
-
0023543848
-
Secret sharing schemes realizing general access structure
-
Proceedings of the IEEE Global Telecommunication Conference
-
M. ITO, A. SAITO, AND T. NISHIZEKI, Secret sharing schemes realizing general access structure, in Proceedings of the IEEE Global Telecommunication Conference, Globecom 87, 1987, pp. 99-102.
-
(1987)
Globecom
, vol.87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
45
-
-
0027289776
-
Multiple assignment scheme for sharing secret
-
Journal version
-
Journal version: Multiple Assignment Scheme for Sharing Secret, J. Cryptology, 6 (1993), pp. 15-20.
-
(1993)
J. Cryptology
, vol.6
, pp. 15-20
-
-
-
46
-
-
0023287513
-
Sublinear parallel algorithm for computing the greatest common divisor of two integers
-
R. KANNAN, G. L. MILLER, AND L. RUDOLPH, Sublinear parallel algorithm for computing the greatest common divisor of two integers, SIAM J. Comput., 16 (1987), pp. 7-16.
-
(1987)
SIAM J. Comput.
, vol.16
, pp. 7-16
-
-
Kannan, R.1
Miller, G.L.2
Rudolph, L.3
-
48
-
-
85028775022
-
Secret sharing made short
-
Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Springer-Verlag, Berlin
-
H. KRAWCZYK, Secret sharing made short, in Advances in Cryptology - CRYPTO '93, D. R. Stinson, ed., Lect. Notes Comput. Sci. 773, Springer-Verlag, Berlin, 1994, pp. 136-146.
-
(1994)
Lect. Notes Comput. Sci.
, vol.773
, pp. 136-146
-
-
Krawczyk, H.1
-
49
-
-
0002885219
-
New secret sharing schemes from old
-
K. M. MARTIN, New secret sharing schemes from old, J. Combin. Math. Combin. Comput., 14 (1993), pp. 65-77.
-
(1993)
J. Combin. Math. Combin. Comput.
, vol.14
, pp. 65-77
-
-
Martin, K.M.1
-
50
-
-
33644594600
-
Compounding secret sharing schemes
-
E. MARTINEZ-MORO, J. MOZO-FERNANDEZ, AND C. MUNUERA, Compounding secret sharing schemes, Australas. J. Combin., 30 (2004), pp. 277-290.
-
(2004)
Australas. J. Combin.
, vol.30
, pp. 277-290
-
-
Martinez-Moro, E.1
Mozo-Fernandez, J.2
Munuera, C.3
-
51
-
-
51249173165
-
A fast parallel algorithm to compute the rank of a matrix over an arbitrary field
-
K. MULMULEY, A fast parallel algorithm to compute the rank of a matrix over an arbitrary field, Combinatorica, 7 (1987), pp. 101-104.
-
(1987)
Combinatorica
, vol.7
, pp. 101-104
-
-
Mulmuley, K.1
-
53
-
-
84947905037
-
A nonlinear secret sharing scheme
-
ACISP: Information Security and Privacy: Australasian Conference, Springer-Verlag, Berlin
-
A. RENVALL AND C. DING, A nonlinear secret sharing scheme, in ACISP: Information Security and Privacy: Australasian Conference, Lect. Notes Comput. Sci. 1172, Springer-Verlag, Berlin, 1996, pp. 56-66.
-
(1996)
Lect. Notes Comput. Sci.
, vol.1172
, pp. 56-66
-
-
Renvall, A.1
Ding, C.2
-
54
-
-
0018545449
-
How to share a secret
-
A. SHAMIR, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
55
-
-
0003038453
-
An introduction to shared secret and/or shared control and their application
-
The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ
-
G. J. SIMMONS, An introduction to shared secret and/or shared control and their application, in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ, 1992, pp. 441-497.
-
(1992)
Contemporary Cryptology
, pp. 441-497
-
-
Simmons, G.J.1
-
56
-
-
0003128147
-
The geometry of shared secret schemes
-
G. J. SIMMONS, W. JACKSON, AND K. M. MARTIN, The geometry of shared secret schemes, Bull. Inst. Combin. Appl., 1 (1991), pp. 71-88.
-
(1991)
Bull. Inst. Combin. Appl.
, vol.1
, pp. 71-88
-
-
Simmons, G.J.1
Jackson, W.2
Martin, K.M.3
-
58
-
-
38149143955
-
Two fast GCD algorithms
-
J. SORENSON, Two fast GCD algorithms, J. Algorithms, 16 (1994), pp. 110-144.
-
(1994)
J. Algorithms
, vol.16
, pp. 110-144
-
-
Sorenson, J.1
-
60
-
-
0000708528
-
An explication of secret sharing schemes
-
D. R. STINSON, An explication of secret sharing schemes, Des. Codes Cryptogr., 2 (1992), pp. 357-390.
-
(1992)
Des. Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
61
-
-
85028945826
-
New general lower bounds on the information rate of secret sharing schemes
-
Advances in Cryptology - CRYPTO '92, E. F. Brickell, ed., Springer-Verlag, Berlin
-
D. R. STINSON, New general lower bounds on the information rate of secret sharing schemes, in Advances in Cryptology - CRYPTO '92, E. F. Brickell, ed., Lect. Notes Comput. Sci. 740, Springer-Verlag, Berlin, 1993, pp. 168-182.
-
(1993)
Lect. Notes Comput. Sci.
, vol.740
, pp. 168-182
-
-
Stinson, D.R.1
-
62
-
-
0029327136
-
An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions
-
D. R. STINSON AND J. L. MASSEY, An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions, J. Cryptology, 8 (1995), pp. 167-173.
-
(1995)
J. Cryptology
, vol.8
, pp. 167-173
-
-
Stinson, D.R.1
Massey, J.L.2
-
63
-
-
0000248498
-
A combinatorial approach to threshold schemes
-
D. R. STINSON AND S. A. VANSTONE, A combinatorial approach to threshold schemes, SIAM J. Discrete Math., 1 (1988), pp. 230-236.
-
(1988)
SIAM J. Discrete Math.
, vol.1
, pp. 230-236
-
-
Stinson, D.R.1
Vanstone, S.A.2
|