-
1
-
-
0003723775
-
-
Cambridge University Press, Cambridge, UK
-
T. BETH, D. JUNGNICKEL, AND H. LENZ, Design Theory, Cambridge University Press, Cambridge, UK, 1993.
-
(1993)
Design Theory
-
-
BETH, T.1
JUNGNICKEL, D.2
LENZ, H.3
-
3
-
-
0005167951
-
The detection of cheaters in threshold schemes
-
E. F. BRICKELL AND D. R. STINSON, The detection of cheaters in threshold schemes, SIAM J. Discrete Math., 4 (1991), pp. 502-510.
-
(1991)
SIAM J. Discrete Math
, vol.4
, pp. 502-510
-
-
BRICKELL, E.F.1
STINSON, D.R.2
-
4
-
-
0001476931
-
A perfect threshold secret sharing scheme to identify cheaters
-
M. CARPENTIERI, A perfect threshold secret sharing scheme to identify cheaters, Des., Codes Cryptogr., 5 (1995), pp. 183-187.
-
(1995)
Des., Codes Cryptogr
, vol.5
, pp. 183-187
-
-
CARPENTIERI, M.1
-
5
-
-
85028775273
-
Size of shares and probability of cheating in threshold schemes
-
Advances in Cryptography, Eurocrypt '93, Springer-Verlag, New York
-
M. CARPENTIERI, A. DE SANTIS, AND U. VACCARO, Size of shares and probability of cheating in threshold schemes, in Advances in Cryptography - Eurocrypt '93, Lecture Notes in Comput. Sci. 765, Springer-Verlag, New York, 1994, pp. 118-125.
-
(1994)
Lecture Notes in Comput. Sci
, vol.765
, pp. 118-125
-
-
CARPENTIERI, M.1
DE SANTIS, A.2
VACCARO, U.3
-
6
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. CHAUM, C. CREPEAU, AND I. DAMGARD, Multiparty unconditionally secure protocols, in Proceedings of the 20th Annual ACM Symposium on the Theory of Computing, 1988, pp. 11-19.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on the Theory of Computing
, pp. 11-19
-
-
CHAUM, D.1
CREPEAU, C.2
DAMGARD, I.3
-
7
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. CHOR, S. GOLDWASSER, S. MICALI, AND B. AWERBUCH, Verifiable secret sharing and achieving simultaneity in the presence of faults, in Proceedings of the 26th IEEE Annual Symposium on the Foundations of Computer Science, 1985, pp. 383-395.
-
(1985)
Proceedings of the 26th IEEE Annual Symposium on the Foundations of Computer Science
, pp. 383-395
-
-
CHOR, B.1
GOLDWASSER, S.2
MICALI, S.3
AWERBUCH, B.4
-
8
-
-
0003938168
-
-
EDS, CRC Press, Boca Raton, FL
-
C. J. COLBOURN AND J. H. DINITZ, EDS., The CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton, FL, 1996.
-
(1996)
The CRC Handbook of Combinatorial Designs
-
-
COLBOURN, C.J.1
DINITZ, J.H.2
-
9
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York
-
R. CRAMER, I. DAMGÅRD, AND U. M. MAURER, General secure multi-party computation from any linear secret-sharing scheme, in Advances in Cryptography - Eurocrypt '00, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York, 2000, pp. 316-334.
-
(2000)
Advances in Cryptography - Eurocrypt '00
, pp. 316-334
-
-
CRAMER, R.1
DAMGÅRD, I.2
MAURER, U.M.3
-
10
-
-
33845925223
-
Error correcting and complexity aspects of linear secret sharing schemes
-
Information Security: 6th International Conference, ISO, Springer-Verlag, New York
-
Y. DESMEDT, K. KUROSAWA, AND T. V. LE, Error correcting and complexity aspects of linear secret sharing schemes, in Information Security: 6th International Conference, ISO 2003, Lecture Notes in Comput. Sci. 2851, Springer-Verlag, New York, 2003, pp. 396-407.
-
(2003)
Lecture Notes in Comput. Sci
, vol.2851
, pp. 396-407
-
-
DESMEDT, Y.1
KUROSAWA, K.2
LE, T.V.3
-
12
-
-
0027289776
-
Multiple assignment scheme for sharing secret
-
M. ITO, A. SAITO, AND T. NISHIZEKI, Multiple assignment scheme for sharing secret, J. Cryptology, 6 (1993), pp. 15-20.
-
(1993)
J. Cryptology
, vol.6
, pp. 15-20
-
-
ITO, M.1
SAITO, A.2
NISHIZEKI, T.3
-
13
-
-
0020543282
-
On secret sharing systems
-
E. D. KARNIN, J. W. GREENE, AND M. E. HELLMAN, On secret sharing systems, IEEE Trans. Inform. Theory, 29 (1982), pp. 35-41.
-
(1982)
IEEE Trans. Inform. Theory
, vol.29
, pp. 35-41
-
-
KARNIN, E.D.1
GREENE, J.W.2
HELLMAN, M.E.3
-
14
-
-
84957630266
-
t-cheater identifiable (k, n) threshold secret sharing schemes
-
Advances in Cryptography, Crypto '95, Springer-Verlag, New York
-
K. KUROSAWA, S. OBANA, AND W. OGATA, t-cheater identifiable (k, n) threshold secret sharing schemes, in Advances in Cryptography - Crypto '95, Lecture Notes in Comput. Sci. 963, Springer-Verlag, New York, 1995, pp. 410-423.
-
(1995)
Lecture Notes in Comput. Sci
, vol.963
, pp. 410-423
-
-
KUROSAWA, K.1
OBANA, S.2
OGATA, W.3
-
16
-
-
0019608784
-
On sharing secrets and Reed-Solomon codes
-
R. J. MCELIECE AND D. V. SARWATE, On sharing secrets and Reed-Solomon codes, Comm. ACM, 24 (1981), pp. 583-584.
-
(1981)
Comm. ACM
, vol.24
, pp. 583-584
-
-
MCELIECE, R.J.1
SARWATE, D.V.2
-
17
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Advances in Cryptography, Crypto '91, Springer-Verlag, New York
-
T. PEDERSEN, Non-interactive and information-theoretic secure verifiable secret sharing, in Advances in Cryptography - Crypto '91, Lecture Notes in Comput. Sci. 576, Springer-Verlag, New York, 1991, pp. 129-149.
-
(1991)
Lecture Notes in Comput. Sci
, vol.576
, pp. 129-149
-
-
PEDERSEN, T.1
-
19
-
-
0039527186
-
An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme
-
R. REES, D. R. STINSON, R. WEI, AND G. H. J. VAN REES, An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme, Ars Combin., 53 (1999), pp. 225-237.
-
(1999)
Ars Combin
, vol.53
, pp. 225-237
-
-
REES, R.1
STINSON, D.R.2
WEI, R.3
VAN REES, G.H.J.4
-
20
-
-
0018545449
-
How to share a secret
-
A. SHAMIR, How to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
SHAMIR, A.1
-
22
-
-
84944048103
-
-
Selected Areas in Cryptography:, Springer-Verlag, New York
-
D. R. STINSON AND R. WEI, Unconditionally secure proactive secret sharing scheme with combinatorial structures, in Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99, Lecture Notes in Comput. Sci. 1758, Springer-Verlag, New York, 2000, pp. 200-214
-
(1758)
Unconditionally secure proactive secret sharing scheme with combinatorial structures, 6th Annual International Workshop, SAC'99, Lecture Notes in Comput. Sci
, pp. 200-214
-
-
STINSON, D.R.1
WEI, R.2
-
23
-
-
0024141971
-
How to share a secret with cheaters
-
M. TOMPA AND H. WOLL, How to share a secret with cheaters, J. Cryptology, 1 (1988), pp. 133-138.
-
(1988)
J. Cryptology
, vol.1
, pp. 133-138
-
-
TOMPA, M.1
WOLL, H.2
-
24
-
-
33847646839
-
A new algorithm for searching a consistent set of shares in a threshold scheme with cheaters
-
Information Security and Cryptology, ICISC 2003, Springer-Verlag, New York
-
R. TSO, Y. MIAO, AND E. OKAMOTO, A new algorithm for searching a consistent set of shares in a threshold scheme with cheaters, in Information Security and Cryptology - ICISC 2003, Lecture Notes in Comput. Sci. 2971, Springer-Verlag, New York, 2004, pp. 377-385.
-
(2004)
Lecture Notes in Comput. Sci
, vol.2971
, pp. 377-385
-
-
TSO, R.1
MIAO, Y.2
OKAMOTO, E.3
|