메뉴 건너뛰기




Volumn 2951, Issue , 2004, Pages 473-490

Hierarchical Threshold Secret Sharing

Author keywords

[No Author keywords available]

Indexed keywords

FINANCIAL MARKETS; HUMAN RESOURCE MANAGEMENT; INFORMATION THEORY; INTERPOLATION;

EID: 35048827923     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24638-1_26     Document Type: Article
Times cited : (53)

References (18)
  • 1
    • 0000229139 scopus 로고
    • A partial characterization of poised Hermite-Birkhoff interpolation problems
    • Atkinson, K., Sharma, A.: A partial characterization of poised Hermite-Birkhoff interpolation problems. Siam Journal on Numerical Analysis G (1969) 230-235
    • (1969) Siam Journal on Numerical Analysis G , pp. 230-235
    • Atkinson, K.1    Sharma, A.2
  • 3
    • 33947514080 scopus 로고
    • Geometric structures as threshold schemes
    • Clarendon Press
    • Beutelspacjer, A., Vedder, K.: Geometric structures as threshold schemes. In Cryptography and Coding, Clarendon Press (1989) 255-268
    • (1989) Cryptography and Coding , pp. 255-268
    • Beutelspacjer, A.1    Vedder, K.2
  • 7
    • 0028381890 scopus 로고
    • The breadth of Shamir's secret sharing scheme
    • Dawson, E., Donovan, D.: The breadth of Shamir's secret sharing scheme. Computers and Security 13 (1994) 69-78
    • (1994) Computers and Security , vol.13 , pp. 69-78
    • Dawson, E.1    Donovan, D.2
  • 9
    • 0021572570 scopus 로고
    • Constructing O(n log n) size monotone formulae for the k-th elementary symmetric polynomial of n Boolean variables
    • Friedman, J.: Constructing O(n log n) size monotone formulae for the k-th elementary symmetric polynomial of n Boolean variables. IEEE Symposium on Foundations of Computer Science (1984) 506-515
    • (1984) IEEE Symposium on Foundations of Computer Science , pp. 506-515
    • Friedman, J.1
  • 13
    • 84885829587 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • LNCS 1403
    • Padró, C., Sáez, G.: Secret sharing schemes with bipartite access structure. Advances in Cryptology - EUROCRYPT 98, LNCS 1403 (1998) 500-511
    • (1998) Advances in Cryptology - EUROCRYPT , vol.98 , pp. 500-511
    • Padró, C.1    Sáez, G.2
  • 17
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their applications
    • IEEE Press
    • Simmons, G.J.: An introduction to shared secret and/or shared control schemes and their applications. In Contemporary Cryptology, The Science of Information Integrity, IEEE Press (1991) 441-497
    • (1991) Contemporary Cryptology, the Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 18
    • 35048901858 scopus 로고    scopus 로고
    • Private communication
    • Wool, A.: Private communication
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.