-
2
-
-
85028918825
-
Threshold schemes with disenrolment
-
BLAKLEY, B., BLAKLEY, G.R., CHAN, A.H. and MASSEY, J. (1993): Threshold schemes with disenrolment. Advances in Cryptology - CRYPTO '92, LNCS, 740:540-548.
-
(1993)
Advances in Cryptology - CRYPTO '92, LNCS
, vol.740
, pp. 540-548
-
-
Blakley, B.1
Blakley, G.R.2
Chan, A.H.3
Massey, J.4
-
4
-
-
84996527783
-
Fully dynamic secret sharing schemes
-
BLUNDO, C., CRESTI, A., DE SANTIS, A. and VACCARO, U. (1993): Fully dynamic secret sharing schemes. Advances in Cryptology - CRYPTO '93, LNCS, 773:110-125.
-
(1993)
Advances in Cryptology - CRYPTO '93, LNCS
, vol.773
, pp. 110-125
-
-
Blundo, C.1
Cresti, A.2
De Santis, A.3
Vaccaro, U.4
-
5
-
-
85029546799
-
On the size of shares for secret sharing schemes
-
CAPOCELLI, R., DE SANTIS, A., GARGANO, L. and VACCARO, U. (1992): On the size of shares for secret sharing schemes. Advances in Cryptology - CRYPTO '91, LNCS, 576: 101-113.
-
(1992)
Advances in Cryptology - CRYPTO '91, LNCS
, vol.576
, pp. 101-113
-
-
Capocelli, R.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
6
-
-
0027607213
-
-
also, Journal of Cryptology, vol. 6, no. 3, pp. 157-167, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.3
, pp. 157-167
-
-
-
9
-
-
0013483720
-
Geometric secret sharing schemes and their duals
-
JACKSON, W.-A. and MARTIN, K.M. (1994): Geometric secret sharing schemes and their duals. Des. Codes Cryptogr., 4:83-95.
-
(1994)
Des. Codes Cryptogr.
, vol.4
, pp. 83-95
-
-
Jackson, W.-A.1
Martin, K.M.2
-
11
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
HERZBERG, A., JARECKI, S., KRAWCZYK, H. and YUNG, M. (1995): Proactive secret sharing or: how to cope with perpetual leakage. Advances in Cryptology - CRYPTO '95, LNCS, 963:339-352.
-
(1995)
Advances in Cryptology - CRYPTO '95, LNCS
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
13
-
-
0020543282
-
On secret sharing systems
-
KARNIN, E., GREENE, J. and HELLMAN, M. (1983): On secret sharing systems. IEEE Transactions on Information Theory, vol. IT-29: 35-41.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, pp. 35-41
-
-
Karnin, E.1
Greene, J.2
Hellman, M.3
-
14
-
-
0005269075
-
Untrustworthy participants in secret sharing schemes
-
Oxford University Press
-
MARTIN, K.M. (1993): Untrustworthy participants in secret sharing schemes. Cryptography and Coding III, Oxford University Press, 255-264.
-
(1993)
Cryptography and Coding III
, pp. 255-264
-
-
Martin, K.M.1
-
16
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. (1979): How to share a secret. Communications of the ACM, 22:612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
0000708528
-
An explication of secret sharing schemes
-
STINSON, D.R. (1992): An explication of secret sharing schemes. Des. Codes Cryptogr., 2:357-390.
-
(1992)
Des. Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
|