-
1
-
-
33644602159
-
On the power of nonlinear secret sharing schemes
-
A. Beimel, Y. Ishai. On the power of nonlinear secret sharing schemes. SIAM J. Discrete Math. 19 (2005) 258-280.
-
(2005)
SIAM J. Discrete Math
, vol.19
, pp. 258-280
-
-
Beimel, A.1
Ishai, Y.2
-
2
-
-
33745543756
-
Third Theory of Cryptography Conference, TCC 2006. Lecture Notes in Comput. Sci
-
482-501
-
A. Beimel, N. Livne. On Matroids and Non-ideal Secret Sharing. Third Theory of Cryptography Conference, TCC 2006. Lecture Notes in Comput. Sci. 3876 (2006) 482-501.
-
(2006)
, vol.3876
-
-
Beimel, A.1
Livne, N.2
-
3
-
-
24144494482
-
Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci
-
600-619
-
A. Beimel, T. Tassa, E. Weinreb. Characterizing Ideal Weighted Threshold Secret Sharing. Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci. 3378 (2005) 600-619.
-
(2005)
, vol.3378
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
4
-
-
27144471932
-
Separating the power of monotone span programs over different fields
-
A. Beimel, E. Weinreb. Separating the power of monotone span programs over different fields. SIAM J. Comput. 34 (2005) 1196-1215.
-
(2005)
SIAM J. Comput
, vol.34
, pp. 1196-1215
-
-
Beimel, A.1
Weinreb, E.2
-
5
-
-
85062838317
-
Safeguarding cryptographic keys
-
G.R. Blakley. Safeguarding cryptographic keys. AFIPS Conference Proceedings. 48 (1979) 313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
7
-
-
85028751599
-
On the information rate of secret sharing schemes. Advances in Cryptology - CRYPTO'92
-
C. Blundo, A. De Santis, L. Gargano, U. Vaccaro. On the information rate of secret sharing schemes. Advances in Cryptology - CRYPTO'92. Lecture Notes in Comput. Sci. 740 (1993) 148-167.
-
(1993)
Lecture Notes in Comput. Sci
, vol.740
, pp. 148-167
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
10
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E.F. Brickell, D.M. Davenport. On the classification of ideal secret sharing schemes. J. Cryptology 4 (1991) 123-134.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
11
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E.F. Brickell, D.R. Stinson. Some improved bounds on the information rate of perfect secret sharing schemes. J. Cryptology 5 (1992) 153-166.
-
(1992)
J. Cryptology
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
13
-
-
0001607361
-
The size of a share must be large
-
L. Csirmaz. The size of a share must be large. J. Cryptology 10 (1997) 223-231.
-
(1997)
J. Cryptology
, vol.10
, pp. 223-231
-
-
Csirmaz, L.1
-
14
-
-
33746337247
-
Efficient Construction of the Dual Span Program
-
Manuscript
-
S. Fehr. Efficient Construction of the Dual Span Program. Manuscript.
-
-
-
Fehr, S.1
-
15
-
-
0017955317
-
Entropy functions and polymatroids-combinatorial structures in information theory
-
S. Fujishige. Entropy functions and polymatroids-combinatorial structures in information theory. Electron. Comm. Japan 61 (1978) 14-18.
-
(1978)
Electron. Comm. Japan
, vol.61
, pp. 14-18
-
-
Fujishige, S.1
-
16
-
-
0018020371
-
Polymatroidal Dependence Structure of a Set of Random Variables
-
S. Fujishige. Polymatroidal Dependence Structure of a Set of Random Variables. Information and Control 39 (1978) 55-72.
-
(1978)
Information and Control
, vol.39
, pp. 55-72
-
-
Fujishige, S.1
-
17
-
-
0031623892
-
A characterization of span program size and improved lower bounds for monotone span programs
-
A. Gal. A characterization of span program size and improved lower bounds for monotone span programs. Proceedings of 30th ACM Symposium on the Theory of Computing, STOC 1998 (1998) 429-437.
-
(1998)
Proceedings of 30th ACM Symposium on the Theory of Computing, STOC 1998
, pp. 429-437
-
-
Gal, A.1
-
19
-
-
0001652944
-
Perfect secret sharing schemes on five participants
-
W.-A. Jackson, K.M. Martin. Perfect secret sharing schemes on five participants. Des. Codes Cryptogr. 9 (1996) 267-286.
-
(1996)
Des. Codes Cryptogr
, vol.9
, pp. 267-286
-
-
Jackson, W.-A.1
Martin, K.M.2
-
21
-
-
0001530822
-
A solution of the Shannon switching game
-
A. Lehman. A solution of the Shannon switching game. J. Soc. Indust. Appl. Math. 12 (1964) 687-725.
-
(1964)
J. Soc. Indust. Appl. Math
, vol.12
, pp. 687-725
-
-
Lehman, A.1
-
22
-
-
0041123553
-
Matroids and Ports
-
A. Lehman. Matroids and Ports. Notices Amer. Math. Soc. 12 (1965) 356-360.
-
(1965)
Notices Amer. Math. Soc
, vol.12
, pp. 356-360
-
-
Lehman, A.1
-
23
-
-
5344242549
-
Secret sharing schemes on sparse homogeneous access structures with rank three
-
Research Paper 72, 16 pp, electronic
-
J.Martí-Farré, C. Padró. Secret sharing schemes on sparse homogeneous access structures with rank three. Electronic Journal of Combinatorics 11(1) (2004) Research Paper 72, 16 pp. (electronic).
-
(2004)
Electronic Journal of Combinatorics
, vol.11
, Issue.1
-
-
Martí-Farré, J.1
Padró, C.2
-
24
-
-
14644407439
-
Secret sharing schemes with three or four minimal qualified subsets
-
J. Martí-Farré, C. Padró. Secret sharing schemes with three or four minimal qualified subsets. Des. Codes Cryptogr. 34 (2005) 17-34.
-
(2005)
Des. Codes Cryptogr
, vol.34
, pp. 17-34
-
-
Martí-Farré, J.1
Padró, C.2
-
25
-
-
33750012353
-
Fifth Conference on Security and Cryptography for Networks, SCN 2006. Lecture Notes in Comput. Sci
-
201-215
-
J.Martí-Farré, C. Padró. Ideal secret sharing schemes whose minimal qualified subsets have at most three participants. Fifth Conference on Security and Cryptography for Networks, SCN 2006. Lecture Notes in Comput. Sci. 4116 (2006) 201-215.
-
(2006)
, vol.4116
-
-
Martí-Farré, J.1
Padró, C.2
-
26
-
-
32144455532
-
Secret sharing schemes on access structures with intersection number equal to one
-
J. Martí-Farré, C. Padró. Secret sharing schemes on access structures with intersection number equal to one. Discrete Applied Mathematics 154 (2006) 552-563.
-
(2006)
Discrete Applied Mathematics
, vol.154
, pp. 552-563
-
-
Martí-Farré, J.1
Padró, C.2
-
27
-
-
0345884729
-
Matroid representations by partitions
-
F. Matúš. Matroid representations by partitions. Discrete Math. 203 (1999) 169-194.
-
(1999)
Discrete Math
, vol.203
, pp. 169-194
-
-
Matúš, F.1
-
28
-
-
23944508637
-
Fourth Conference on Security in Communication Networks - SCN 2004. Lecture Notes in Comput. Sci
-
252-265
-
V. Nikov, S. Nikova, B. Preneel. On the Size of Monotone Span Programs. Fourth Conference on Security in Communication Networks - SCN 2004. Lecture Notes in Comput. Sci. 3352 (2004) 252-265.
-
(2004)
, vol.3352
-
-
Nikov, V.1
Nikova, S.2
Preneel, B.3
-
29
-
-
0004061262
-
-
Oxford Science Publications. The Clarendon Press, Oxford University Press, New York
-
J.G. Oxley. Matroid theory. Oxford Science Publications. The Clarendon Press, Oxford University Press, New York, 1992.
-
(1992)
Matroid theory
-
-
Oxley, J.G.1
-
30
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
C. Padró, G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Trans. Inform. Theory 46 (2000) 2596-2604.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 2596-2604
-
-
Padró, C.1
Sáez, G.2
-
31
-
-
0037200862
-
Lower bounds on the information rate of secret sharing schemes with homogeneous access structure
-
345-351. Quoting Marc Heymann Pignolo ¡mheymann@ma4.upc.edu¿
-
C. Padró, G. Sáez. Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. Inform. Process. Lett. 83 (2002) 345-351. Quoting Marc Heymann Pignolo ¡mheymann@ma4.upc.edu¿:
-
(2002)
Inform. Process. Lett
, vol.83
-
-
Padró, C.1
Sáez, G.2
-
32
-
-
0039935716
-
A forbidden minor characterization of matroid ports
-
P.D. Seymour. A forbidden minor characterization of matroid ports. Quart. J. Math. Oxford Ser. 27 (1976) 407-413.
-
(1976)
Quart. J. Math. Oxford Ser
, vol.27
, pp. 407-413
-
-
Seymour, P.D.1
-
33
-
-
38249009286
-
On secret-sharing matroids
-
P.D. Seymour. On secret-sharing matroids. J. Combin. Theory Ser. B 56 (1992) 69-73.
-
(1992)
J. Combin. Theory Ser. B
, vol.56
, pp. 69-73
-
-
Seymour, P.D.1
-
34
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun, of the ACM 22 (1979) 612-613.
-
(1979)
Commun, of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
36
-
-
0000708528
-
An explication of secret sharing schemes
-
D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr. 2 (1992) 357-390.
-
(1992)
Des. Codes Cryptogr
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
37
-
-
85028945826
-
New general lower bounds on the information rate of secret sharing schemes. Advances in Cryptology - CRYPTO'92
-
D.R. Stinson. New general lower bounds on the information rate of secret sharing schemes. Advances in Cryptology - CRYPTO'92. Lecture Notes in Comput. Sci. 740 (1993) 168-182.
-
(1993)
Lecture Notes in Comput. Sci
, vol.740
, pp. 168-182
-
-
Stinson, D.R.1
-
38
-
-
0028323999
-
Decomposition constructions for secret-sharing schemes
-
D.R. Stinson. Decomposition constructions for secret-sharing schemes. IEEE Trans. Inform. Theory 40 (1994) 118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
|