-
1
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
S. Goldwasser, editor, Springer-Verlag, Santa Barbara, California, U.S.A., August 11-15
-
J. C. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In S. Goldwasser, editor, Advances in Cryptology, Proc. of Crypto'88 (Lecture Notes in Computer Science 403), pages 27-35. Springer-Verlag, 1990. Santa Barbara, California, U.S.A., August 11-15.
-
(1990)
Advances in Cryptology, Proc. of Crypto'88 (Lecture Notes in Computer Science 403)
, pp. 27-35
-
-
Benaloh, J.C.1
Leichter, J.2
-
2
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
May 2-4
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC, pp. 1-10, May 2-4, 1988.
-
(1988)
Proceedings of the Twentieth Annual ACM Symp. Theory of Computing, STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
84947917753
-
Efficient multiplicative sharing schemes
-
U. Maurer, editor, Springer-Verlag, Zaragoza, Spain, May 12-16
-
S. R. Blackburn, M. Burmester, Y. Desmedt, and P. R. Wild. Efficient multiplicative sharing schemes. In U. Maurer, editor, Advances in Cryptology - Eurocrypt '96, Proceedings (Lecture Notes in Computer Science 1070), pp. 107-118. Springer-Verlag, 1996. Zaragoza, Spain, May 12-16.
-
(1996)
Advances in Cryptology - Eurocrypt '96, Proceedings (Lecture Notes in Computer Science 1070)
, pp. 107-118
-
-
Blackburn, S.R.1
Burmester, M.2
Desmedt, Y.3
Wild, P.R.4
-
5
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
May 2-4
-
D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols. In Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC, pp. 11-19, May 2-4, 1988.
-
(1988)
Proceedings of the Twentieth Annual ACM Symp. Theory of Computing, STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
6
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
B. Preneel, editor, Springer-Verlag, Bruges, Belgium, May 14-18
-
R. Cramer, I. Damgård, and U. M. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In B. Preneel, editor, Advances in Cryptology - Eurocrypt 2000, Proceedings (Lecture Notes in Computer Science 1807), pp. 316-334. Springer-Verlag, 2000. Bruges, Belgium, May 14-18.
-
(2000)
Advances in Cryptology - Eurocrypt 2000, Proceedings (Lecture Notes in Computer Science 1807)
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.M.3
-
7
-
-
0027961556
-
How to share a function securely
-
May 23-25, Montréal, Québec, Canada
-
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung. How to share a function securely. In Proceedings of the twenty-sixth annual ACM Symp. Theory of Computing (STOC), pp. 522-533, May 23-25, 1994. Montréal, Québec, Canada.
-
(1994)
Proceedings of the Twenty-sixth Annual ACM Symp. Theory of Computing (STOC)
, pp. 522-533
-
-
De Santis, A.1
Desmedt, Y.2
Frankel, Y.3
Yung, M.4
-
8
-
-
84955564953
-
Multiplicative non-abelian sharing schemes and their application to threshold cryptography
-
J. Pieprzyk and R. Safavi-Naini, editors, Springer-Verlag, Wollongong, Australia, November/December, 1994
-
Y. Desmedt, G. Di Crescenzo, and M. Burmester. Multiplicative non-abelian sharing schemes and their application to threshold cryptography. In J. Pieprzyk and R. Safavi-Naini, editors, Advances in Cryptology - Asiacrypt '94, Proceedings (Lecture Notes in Computer Science 917), pp. 21-32. Springer-Verlag, 1995. Wollongong, Australia, November/December, 1994.
-
(1995)
Advances in Cryptology - Asiacrypt '94, Proceedings (Lecture Notes in Computer Science 917)
, pp. 21-32
-
-
Desmedt, Y.1
Di Crescenzo, G.2
Burmester, M.3
-
9
-
-
0000527282
-
Homomorphic zero-knowledge threshold schemes over any finite abelian group
-
November
-
Y. G. Desmedt and Y. Frankel. Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM Journal on Discrete Mathematics, 7(4), pp. 667-679, November 1994.
-
(1994)
SIAM Journal on Discrete Mathematics
, vol.7
, Issue.4
, pp. 667-679
-
-
Desmedt, Y.G.1
Frankel, Y.2
-
11
-
-
0023545076
-
How to play any mental game
-
May 25-27
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the Nineteenth annual ACM Symp. Theory of Computing, STOC, pp. 218-229, May 25-27, 1987.
-
(1987)
Proceedings of the Nineteenth Annual ACM Symp. Theory of Computing, STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
0023543848
-
Secret sharing schemes realizing general access structures
-
IEEE Communications Soc. Press
-
M. Ito, A. Saito, and T. Nishizeki. Secret sharing schemes realizing general access structures. In Proc. IEEE Global Telecommunications Conf., Globecom'87, pp. 99-102. IEEE Communications Soc. Press, 1987.
-
(1987)
Proc. IEEE Global Telecommunications Conf., Globecom'87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
13
-
-
0003805590
-
-
W. H. Freeman and Company, New York
-
N. Jacobson. Basic Algebra I. W. H. Freeman and Company, New York, 1985.
-
(1985)
Basic Algebra I
-
-
Jacobson, N.1
-
14
-
-
0003805590
-
-
W. H. Freeman and Company, New York
-
N. Jacobson. Basic Algebra II. W. H. Freeman and Company, New York, 1989.
-
(1989)
Basic Algebra II
-
-
Jacobson, N.1
-
15
-
-
0020543282
-
On secret sharing systems
-
January
-
E. D. Karnin, J. W. Greene, and M. Hellman. On secret sharing systems. IEEE Tr. Inform. Theory, 29(1), pp. 35-41, January 1983.
-
(1983)
IEEE Tr. Inform. Theory
, vol.29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.3
-
16
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
September
-
R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Comm. ACM, 24(9), pp. 583-584, September 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
17
-
-
85028758941
-
Fair public-key cryptosystems
-
E. F. Brickell, editor, Springer-Verlag, Santa Barbara, California, U.S.A., August 16-20
-
S. Micali. Fair public-key cryptosystems. In E. F. Brickell, editor, Advances in Cryptology - Crypto '92, Proceedings (Lecture Notes in Computer Science 740), pp. 113-138. Springer-Verlag, 1993. Santa Barbara, California, U.S.A., August 16-20.
-
(1993)
Advances in Cryptology - Crypto '92, Proceedings (Lecture Notes in Computer Science 740)
, pp. 113-138
-
-
Micali, S.1
-
19
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Commun. ACM, 22, pp. 612-613, November 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
0003128147
-
The geometry of shared secret schemes
-
G. J. Simmons, W. Jackson, and K. Martin. The geometry of shared secret schemes. Bulletin of the Institute of Combinatorics and its Applications, 1, pp. 71-88, 1991.
-
(1991)
Bulletin of the Institute of Combinatorics and Its Applications
, vol.1
, pp. 71-88
-
-
Simmons, G.J.1
Jackson, W.2
Martin, K.3
|