-
1
-
-
84955599590
-
-
Springer-Verlag, Berlin, 1993, pp. 183-195.
-
A. Beimel and B. Chor, Universally ideal secret sharing schemes, Advances in Cryplology - Crypto '92, Lecture Notes in Computer Science, vol. 740, E. F. Brickell, ed., Springer-Verlag, Berlin, 1993, pp. 183-195.
-
And B. Chor, Universally Ideal Secret Sharing Schemes, Advances in Cryplology - Crypto '92, Lecture Notes in Computer Science, Vol. 740, E. F. Brickell, Ed.
-
-
Beimel, A.1
-
2
-
-
85027202957
-
-
1990. pp. 27-35.
-
J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, Advances in Cryptology Crypto '88, Lecture Notes in Computer Science, vol. 403, S. Goldwasser, ed., Springer-Verlag, Berlin, 1990. pp. 27-35.
-
Generalized Secret Sharing and Monotone Functions, Advances in Cryptology Crypto '88, Lecture Notes in Computer Science, Vol. 403, S. Goldwasser, Ed., Springer-Verlag, Berlin
-
-
Benaloh, J.1
Leichter, J.2
-
3
-
-
85062838317
-
-
pp. 313-317.
-
G. R. Blakley, Safeguarding cryptographic keys, Proc. AF1PS 1979, NCC, vol. 48, New York, 1979, pp. 313-317.
-
Safeguarding Cryptographic Keys, Proc. AF1PS 1979, NCC, Vol. 48, New York, 1979
-
-
Blakley, G.R.1
-
4
-
-
0029631974
-
-
pp. 39-64.
-
C. Blundo, A. De Santis, D. P. Stinson, and U. Vaccaro, Graph decompositions and secret sharing schemes, J. Cryptology, vol. 8 (1995), pp. 39-64.
-
A. de Santis, D. P. Stinson, and U. Vaccaro, Graph Decompositions and Secret Sharing Schemes, J. Cryptology, Vol. 8 (1995)
-
-
Blundo, C.1
-
8
-
-
0027607213
-
-
pp. 157-168.
-
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the size of shares for secret sharing schemes, J. Cryptology, vol. 6 (1993), pp. 157-168.
-
A. de Santis, L. Gargano, and U. Vaccaro, on the Size of Shares for Secret Sharing Schemes, J. Cryptology, Vol. 6 (1993)
-
-
Capocelli, R.M.1
-
10
-
-
0023543848
-
-
pp. 99-102.
-
M. Ito, A. Saito, and T. Nishizeki, Secret sharing scheme realizing general access structure, Proc. IEEE Globecom '87, Tokyo, 1987, pp. 99-102.
-
A. Saito, and T. Nishizeki, Secret Sharing Scheme Realizing General Access Structure, Proc. IEEE Globecom '87, Tokyo, 1987
-
-
Ito, M.1
-
15
-
-
85034167885
-
-
pp. 441-497.
-
G. J. Simmons, An introduction to shared secret and/or shared control schemes and.their applications, Contemporary Cryptology: the Science of Information Integrity, G. J. Simmons, ed., IEEE Press, New York, 1992, pp. 441-497.
-
An Introduction to Shared Secret And/or Shared Control Schemes And.their Applications, Contemporary Cryptology: the Science of Information Integrity, G. J. Simmons, Ed., IEEE Press, New York, 1992
-
-
Simmons, G.J.1
|