-
1
-
-
33745543756
-
Third Theory of Cryptography Conference, TCC 2006. Lecture Notes in Comput. Sci
-
482-501
-
A. Beimel, N. Livne. On Matroids and Non-ideal Secret Sharing. Third Theory of Cryptography Conference, TCC 2006. Lecture Notes in Comput. Sci. 3876 (2006) 482-501.
-
(2006)
, vol.3876
-
-
Beimel, A.1
Livne, N.2
-
2
-
-
24144494482
-
Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci
-
600-619
-
A. Beimel, T. Tassa, E. Weinreb. Characterizing Ideal Weighted Threshold Secret Sharing. Second Theory of Cryptography Conference, TCC 2005. Lecture Notes in Comput. Sci. 3378 (2005) 600-619.
-
(2005)
, vol.3378
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
3
-
-
85027202957
-
Generalized secret sharing and monotone functions. Advances in Cryptology, CRYPTO'88
-
J. Benaloh, J. Leichter. Generalized secret sharing and monotone functions. Advances in Cryptology, CRYPTO'88. Lecture Notes in Comput. Sci. 403 (1990) 27-35.
-
(1990)
Lecture Notes in Comput. Sci
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
4
-
-
85062838317
-
Safeguarding cryptographic keys
-
G.R. Blakley. Safeguarding cryptographic keys. AFIPS Conference Proceedings. 48 (1979) 313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
6
-
-
85028751599
-
On the information rate of secret sharing schemes. Advances in Cryptology, CRYPTO'92
-
C Blundo, A. De Santis, L. Gargano, U. Vaccaro. On the information rate of secret sharing schemes. Advances in Cryptology, CRYPTO'92. Lecture Notes in Comput. Sci. 740 (1993) 148-167.
-
(1993)
Lecture Notes in Comput. Sci
, vol.740
, pp. 148-167
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
8
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E.F. Brickell, D.M. Davenport. On the classification of ideal secret sharing schemes. J. Cryptology 4 (1991) 123-134.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
10
-
-
38049122768
-
-
M.J. Collins. A Note on Ideal Tripartite Access Structures. Cryptology ePrint Archive, Report 2002/193, http://eprint.iacr.org/2002/193.
-
M.J. Collins. A Note on Ideal Tripartite Access Structures. Cryptology ePrint Archive, Report 2002/193, http://eprint.iacr.org/2002/193.
-
-
-
-
11
-
-
0001607361
-
The size of a share must be large
-
L. Csirmaz. The size of a share must be large. J. Cryptology 10 (1997) 223-231.
-
(1997)
J. Cryptology
, vol.10
, pp. 223-231
-
-
Csirmaz, L.1
-
15
-
-
0001652944
-
Perfect secret sharing schemes on five participants
-
W.-A. Jackson, K.M. Martin. Perfect secret sharing schemes on five participants. Des. Codes Cryptogr. 9 (1996) 267-286.
-
(1996)
Des. Codes Cryptogr
, vol.9
, pp. 267-286
-
-
Jackson, W.-A.1
Martin, K.M.2
-
17
-
-
0001530822
-
A solution of the Shannon switching game
-
A. Lehman. A solution of the Shannon switching game. J. Soc. Indust. Appl. Math. 12 (1964) 687-725.
-
(1964)
J. Soc. Indust. Appl. Math
, vol.12
, pp. 687-725
-
-
Lehman, A.1
-
18
-
-
14644407439
-
Secret sharing schemes with three or four minimal qualified subsets
-
J. Martí-Farré, C. Padró. Secret sharing schemes with three or four minimal qualified subsets. Des. Codes Cryptogr. 34 (2005) 17-34.
-
(2005)
Des. Codes Cryptogr
, vol.34
, pp. 17-34
-
-
Martí-Farré, J.1
Padró, C.2
-
19
-
-
32144455532
-
Secret sharing schemes on access structures with intersection number equal to one
-
J. Martí-Farré, C. Padró. Secret sharing schemes on access structures with intersection number equal to one. Discrete Applied Mathematics 154 (2006) 552-563.
-
(2006)
Discrete Applied Mathematics
, vol.154
, pp. 552-563
-
-
Martí-Farré, J.1
Padró, C.2
-
20
-
-
33750012353
-
Fifth Conference on Security and Cryptography for Networks, SCN 2006, Lecture Notes in Comput. Sci
-
201-215
-
J.Martí-Farré, C. Padró. Ideal secret sharing schemes whose minimal qualified subsets have at most three participants. Fifth Conference on Security and Cryptography for Networks, SCN 2006, Lecture Notes in Comput. Sci., 4116 (2006) 201-215.
-
(2006)
, vol.4116
-
-
Martí-Farré, J.1
Padró, C.2
-
21
-
-
38049036249
-
Fourth IACR Theory of Cryptography Conference TCC 2007, Lecture Notes in Comput. Sci
-
273-290
-
J. Martí-Farré, C. Padró. On Secret Sharing Schemes, Matroids and Polymatroids. Fourth IACR Theory of Cryptography Conference TCC 2007, Lecture Notes in Comput. Sci. 4392 (2007) 273-290.
-
(2007)
, vol.4392
-
-
Martí-Farré, J.1
Padró, C.2
-
22
-
-
0345884729
-
Matroid representations by partitions
-
F. Matúš. Matroid representations by partitions. Discrete Math. 203 (1999) 169-194.
-
(1999)
Discrete Math
, vol.203
, pp. 169-194
-
-
Matúš, F.1
-
24
-
-
0041928150
-
A Representation of a Family of Secret Sharing Matroids
-
S.-L. Ng. A Representation of a Family of Secret Sharing Matroids. Des. Codes Cryptogr. 30 (2003) 5-19.
-
(2003)
Des. Codes Cryptogr
, vol.30
, pp. 5-19
-
-
Ng, S.-L.1
-
25
-
-
33645011748
-
Ideal secret sharing schemes with multipartite access structures
-
S.-L. Ng. Ideal secret sharing schemes with multipartite access structures. IEE Proc.-Commun. 153 (2006) 165-168.
-
(2006)
IEE Proc.-Commun
, vol.153
, pp. 165-168
-
-
Ng, S.-L.1
-
26
-
-
0035452614
-
On the composition of matroids and ideal secret sharing schemes
-
S.-L. Ng, M. Walker. On the composition of matroids and ideal secret sharing schemes. Des. Codes Cryptogr. 24 (2001) 49-67.
-
(2001)
Des. Codes Cryptogr
, vol.24
, pp. 49-67
-
-
Ng, S.-L.1
Walker, M.2
-
27
-
-
0004061262
-
-
Oxford Science Publications. The Clarendon Press, Oxford University Press, New York
-
J.G. Oxley. Matroid theory. Oxford Science Publications. The Clarendon Press, Oxford University Press, New York, 1992.
-
(1992)
Matroid theory
-
-
Oxley, J.G.1
-
28
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
C. Padró, G. Sáez. Secret sharing schemes with bipartite access structure. IEEE Trans. Inform. Theory 46 (2000) 2596-2604.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 2596-2604
-
-
Padró, C.1
Sáez, G.2
-
29
-
-
0039935716
-
A forbidden minor characterization of matroid ports
-
P.D. Seymour. A forbidden minor characterization of matroid ports. Quart. J. Math. Oxford Ser. 27 (1976) 407-413.
-
(1976)
Quart. J. Math. Oxford Ser
, vol.27
, pp. 407-413
-
-
Seymour, P.D.1
-
30
-
-
38249009286
-
On secret-sharing matroids
-
P.D. Seymour. On secret-sharing matroids. J. Combin. Theory Ser. B, 56 (1992) pp. 69-73.
-
(1992)
J. Combin. Theory Ser. B
, vol.56
, pp. 69-73
-
-
Seymour, P.D.1
-
31
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. of the ACM, 22 (1979) pp. 612-613.
-
(1979)
Commun. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
32
-
-
84898132112
-
How to (Really) Share a Secret. Advances in Cryptology CRYPTO'88
-
G. J. Simmons. How to (Really) Share a Secret. Advances in Cryptology CRYPTO'88, Lecture Notes in Comput. Sci. 403 (1990) 390-448.
-
(1990)
Lecture Notes in Comput. Sci
, vol.403
, pp. 390-448
-
-
Simmons, G.J.1
-
34
-
-
0000708528
-
An explication of secret sharing schemes
-
D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr. 2 (1992) 357-390.
-
(1992)
Des. Codes Cryptogr
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
35
-
-
35048827923
-
Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004- Lecture Notes in Comput. Sci
-
473-490
-
T. Tassa. Hierarchical Threshold Secret Sharing. Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004- Lecture Notes in Comput. Sci. 2951 (2004) 473-490.
-
(2004)
, vol.2951
-
-
Tassa, T.1
-
36
-
-
33746381973
-
33rd International Colloquium on Automata, Languages and Programming, ICALP 2006 - Lecture Notes in Comput. Sci
-
288-299
-
T. Tassa, N. Dyn. Multipartite Secret Sharing by Bivariate Interpolation. 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006 - Lecture Notes in Comput. Sci. 4052 (2006) 288-299.
-
(2006)
, vol.4052
-
-
Tassa, T.1
Dyn, N.2
|