-
2
-
-
84957652167
-
General short computational secret sharing schemes
-
EUROCRYPT '95, of
-
P. Beguin and A. Cresti. General short computational secret sharing schemes. In EUROCRYPT '95, vol. 921 of LNCS, pages 194-208. 1995.
-
(1995)
LNCS
, vol.921
, pp. 194-208
-
-
Beguin, P.1
Cresti, A.2
-
4
-
-
38049078172
-
On private computation in incomplete networks
-
A. Beimel. On private computation in incomplete networks. Distributed Computing, 2006.
-
(2006)
Distributed Computing
-
-
Beimel, A.1
-
5
-
-
0029732650
-
Communication in key distribution schemes
-
A. Beimel and B. Chor. Communication in key distribution schemes. IEEE Trans. on Information Theory, 42(1):19-28, 1996.
-
(1996)
IEEE Trans. on Information Theory
, vol.42
, Issue.1
, pp. 19-28
-
-
Beimel, A.1
Chor, B.2
-
6
-
-
33644602159
-
On the power of nonlinear secret-sharing
-
A. Beimel and Y. Ishai. On the power of nonlinear secret-sharing. SIAM J. on Discrete Mathematics, 19(1):258-280, 2005.
-
(2005)
SIAM J. on Discrete Mathematics
, vol.19
, Issue.1
, pp. 258-280
-
-
Beimel, A.1
Ishai, Y.2
-
7
-
-
33745543756
-
On matroids and non-ideal secret sharing
-
TCC 2006, of
-
A. Beimel and N. Livne. On matroids and non-ideal secret sharing. In TCC 2006, vol. 3876 of LNCS, pages 482-501, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 482-501
-
-
Beimel, A.1
Livne, N.2
-
8
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computations
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computations. In Proc. of the 20th STOC, pages 1-10, 1988.
-
(1988)
Proc. of the 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
9
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
CRYPTO '88, of
-
J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In CRYPTO '88, vol. 403 of LNCS, pages 27-35. 1990.
-
(1990)
LNCS
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
11
-
-
0001003172
-
Tight bounds on the information rate of secret sharing schemes
-
C. Blundo, A. De Santis, R. de Simone, and U. Vaccaro. Tight bounds on the information rate of secret sharing schemes. Designs, Codes and Cryptography, 11(2):107-122, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.11
, Issue.2
, pp. 107-122
-
-
Blundo, C.1
De Santis, A.2
de Simone, R.3
Vaccaro, U.4
-
12
-
-
0029277778
-
New bounds on the information rate of secret sharing schemes
-
C. Blundo, A. De Santis, A. Giorgio Gaggia, and U. Vaccaro. New bounds on the information rate of secret sharing schemes. IEEE Trans. on Information Theory, 41(2):549-553, 1995.
-
(1995)
IEEE Trans. on Information Theory
, vol.41
, Issue.2
, pp. 549-553
-
-
Blundo, C.1
De Santis, A.2
Giorgio Gaggia, A.3
Vaccaro, U.4
-
13
-
-
0005908666
-
Perfectly secure key distribution for dynamic conferences
-
1-23
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly secure key distribution for dynamic conferences. Info. and Comput., 146(1):1-23, 1998.
-
(1998)
Info. and Comput
, vol.146
, Issue.1
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
16
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. Brickell and D. M. Davenport. On the classification of ideal secret sharing schemes. J. of Cryptology, 4(73): 123-134, 1991.
-
(1991)
J. of Cryptology
, vol.4
, Issue.73
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
17
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro. On the size of shares for secret sharing schemes. J. of Cryptology, 6(3): 157-168, 1993.
-
(1993)
J. of Cryptology
, vol.6
, Issue.3
, pp. 157-168
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
19
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
EUROCRYPT 2000, of
-
R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In EUROCRYPT 2000, vol. 1807 of LNCS, pages 316-334. 2000.
-
(2000)
LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
20
-
-
84948972864
-
The size of a share must be large
-
EUROCRYPT '94, of
-
L. Csirmaz. The size of a share must be large. In EUROCRYPT '94, vol. 950 of LNCS, pages 13-22. 1995.
-
(1995)
LNCS
, vol.950
, pp. 13-22
-
-
Csirmaz, L.1
-
21
-
-
0001607361
-
Also in
-
Also in: J. of Cryptology, 10(4):223-231, 1997.
-
(1997)
J. of Cryptology
, vol.10
, Issue.4
, pp. 223-231
-
-
-
22
-
-
0004020725
-
The dealer's random bits in perfect secret sharing schemes
-
L. Csirmaz. The dealer's random bits in perfect secret sharing schemes. Studia Sci. Math. Hungar., 32(3-4):429-437, 1996.
-
(1996)
Studia Sci. Math. Hungar
, vol.32
, Issue.3-4
, pp. 429-437
-
-
Csirmaz, L.1
-
23
-
-
33745808735
-
Linear integer secret sharing and distributed exponentiation
-
PKC 2006, of
-
I. Damgård and R. Thorbek. Linear integer secret sharing and distributed exponentiation. In PKC 2006, vol. 3958 of LNCS, pages 75-90. 2006.
-
(2006)
LNCS
, vol.3958
, pp. 75-90
-
-
Damgård, I.1
Thorbek, R.2
-
24
-
-
85022187530
-
Shared generation of authenticators and signatures
-
CRYPTO '91, of
-
Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In CRYPTO '91, vol. 576 of LNCS, pages 457-469. 1992.
-
(1992)
LNCS
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
25
-
-
0001522694
-
On the information rate of perfect secret sharing schemes
-
M. van Dijk. On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6:143-169, 1995.
-
(1995)
Designs, Codes and Cryptography
, vol.6
, pp. 143-169
-
-
van Dijk, M.1
-
26
-
-
0003944144
-
A linear construction of secret sharing schemes
-
M. van Dijk. A linear construction of secret sharing schemes. Designs, Codes and Cryptography, 12(2):161-201, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, Issue.2
, pp. 161-201
-
-
van Dijk, M.1
-
27
-
-
34547273527
-
Attribute based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute based encryption for fine-grained access control of encrypted data. In CCS 2006, 2006.
-
(2006)
CCS 2006
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
28
-
-
38049075076
-
-
Personal communication
-
Y. Ishai. Personal communication. 2006.
-
(2006)
-
-
Ishai, Y.1
-
29
-
-
0023543848
-
Secret sharing schemes realizing general access structure
-
M. Ito, A. Saito, and T. Nishizeki. Secret sharing schemes realizing general access structure. In Proc. of Globecom 87, pages 99-102, 1987.
-
(1987)
Proc. of Globecom
, vol.87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
32
-
-
0020543282
-
On secret sharing systems
-
E. D. Karnin, J. W. Greene, and M. E. Hellman. On secret sharing systems. IEEE Trans. on Information Theory, 29(1):35-41, 1983.
-
(1983)
IEEE Trans. on Information Theory
, vol.29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
33
-
-
38048999285
-
-
Private communication
-
J. Kilian and N. Nisan. Private communication, 1990.
-
(1990)
-
-
Kilian, J.1
Nisan, N.2
-
34
-
-
84867963255
-
On the bound for anonymous secret sharing schemes
-
W. Kishimoto, K. Okada, K. Kurosawa, and W. Ogata. On the bound for anonymous secret sharing schemes. Discrete Appl. Math., 121 (1-3):193-202, 2002.
-
(2002)
Discrete Appl. Math
, vol.121
, Issue.1-3
, pp. 193-202
-
-
Kishimoto, W.1
Okada, K.2
Kurosawa, K.3
Ogata, W.4
-
35
-
-
85028775022
-
Secret sharing made short
-
CRYPTO '93, of
-
H. Krawczyk. Secret sharing made short. In CRYPTO '93, vol. 773 of LNCS, pages 136-146. 1994.
-
(1994)
LNCS
, vol.773
, pp. 136-146
-
-
Krawczyk, H.1
-
36
-
-
0042376701
-
Combinatorial lower bounds for secret sharing schemes
-
K. Kurosawa and K. Okada. Combinatorial lower bounds for secret sharing schemes. Inform. Process. Lett., 60(6):301-304, 1996.
-
(1996)
Inform. Process. Lett
, vol.60
, Issue.6
, pp. 301-304
-
-
Kurosawa, K.1
Okada, K.2
-
37
-
-
0002365530
-
Privacy and communication complexity
-
E. Kushilevitz. Privacy and communication complexity. SIAM J. on Discrete Mathematics, 5(2):273-284, 1992.
-
(1992)
SIAM J. on Discrete Mathematics
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
38
-
-
0028514351
-
On the hardness of approximating minimization problems
-
C. Lund and M. Yannakakis. On the hardness of approximating minimization problems. J. of the ACM, 41(5):960-981, 1994.
-
(1994)
J. of the ACM
, vol.41
, Issue.5
, pp. 960-981
-
-
Lund, C.1
Yannakakis, M.2
-
39
-
-
70350701639
-
On secret sharing schemes, matroids and polymartroids
-
Technical Report 2006/077, Cryptology ePrint Archive, 2006
-
J. Martí-Farré and C. Padró. On secret sharing schemes, matroids and polymartroids. Technical Report 2006/077, Cryptology ePrint Archive, 2006.
-
-
-
Martí-Farré, J.1
Padró, C.2
-
40
-
-
0037435792
-
A combinatorial characterization of regular anonymous perfect threshold schemes
-
Y. Miao. A combinatorial characterization of regular anonymous perfect threshold schemes. Inform. Process. Lett., 85(3):131-135, 2003.
-
(2003)
Inform. Process. Lett
, vol.85
, Issue.3
, pp. 131-135
-
-
Miao, Y.1
-
42
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
C. Padró and G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Trans. on Information Theory, 46:2596-2605, 2000.
-
(2000)
IEEE Trans. on Information Theory
, vol.46
, pp. 2596-2605
-
-
Padró, C.1
Sáez, G.2
-
47
-
-
0028323999
-
Decomposition construction for secret sharing schemes
-
D. R. Stinson. Decomposition construction for secret sharing schemes. IEEE Trans. on Information Theory, 40(1):118-125, 1994.
-
(1994)
IEEE Trans. on Information Theory
, vol.40
, Issue.1
, pp. 118-125
-
-
Stinson, D.R.1
-
49
-
-
0346895377
-
On the power of computational secret sharing
-
Indocrypt 2003, of
-
V. Vinod, A. Narayanan, K. Srinathan, C. Pandu Rangan, and K. Kim. On the power of computational secret sharing. In Indocrypt 2003, vol. 2904 of LNCS, pages 162-176. 2003.
-
(2003)
LNCS
, vol.2904
, pp. 162-176
-
-
Vinod, V.1
Narayanan, A.2
Srinathan, K.3
Pandu Rangan, C.4
Kim, K.5
-
50
-
-
38049059012
-
-
Unpublished manuscript, Presented at workshops
-
A. C. Yao. Unpublished manuscript, 1989. Presented at Oberwolfach and DIMACS workshops.
-
(1989)
Oberwolfach and DIMACS
-
-
Yao, A.C.1
|