-
1
-
-
77649247421
-
-
G. R. Blakley, Safeguarding cryptographic keys, Proc. AFIPS 1979, National Computer Conference, 48, pp. 313-137, 1979. 4, no. 4, pp. 502-510, 1991.
-
G. R. Blakley, "Safeguarding cryptographic keys," Proc. AFIPS 1979, National Computer Conference, vol. 48, pp. 313-137, 1979. vol. 4, no. 4, pp. 502-510, 1991.
-
-
-
-
2
-
-
0001476931
-
A Perfect Threshold Secret Sharing Scheme to Identify Cheaters
-
M. Carpentieri, "A Perfect Threshold Secret Sharing Scheme to Identify Cheaters," Designs, Codes and Cryptography, vol. 5, no. 3, pp. 183-187, 1995.
-
(1995)
Designs, Codes and Cryptography
, vol.5
, Issue.3
, pp. 183-187
-
-
Carpentieri, M.1
-
3
-
-
85028775273
-
Size of Shares and Probability of Cheating in Threshold Schemes
-
Proc. Eurocrypt'93, 765, Springer Verlag, pp
-
M. Carpentieri, A. De Santis and U. Vaccaro, "Size of Shares and Probability of Cheating in Threshold Schemes," Proc. Eurocrypt'93, Lecture Notes in Computer Science, vol. 765, Springer Verlag, pp. 118-125, 1993.
-
(1993)
Lecture Notes in Computer Science
, pp. 118-125
-
-
Carpentieri, M.1
De Santis, A.2
Vaccaro, U.3
-
4
-
-
84948975649
-
-
R. Cramer, I. Damg?ard and U. M. Maurer, General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, Proc. Eurocrypt'00, Lecture Notes in Computer Science, 1807, Springer Verlag, pp. 316-334, 2000.
-
R. Cramer, I. Damg?ard and U. M. Maurer, "General Secure Multi-party Computation from any Linear Secret-Sharing Scheme," Proc. Eurocrypt'00, Lecture Notes in Computer Science, vol. 1807, Springer Verlag, pp. 316-334, 2000.
-
-
-
-
5
-
-
0013259203
-
A Simple and Key-Economical Unconditional Authentication Scheme
-
B. den Boer, "A Simple and Key-Economical Unconditional Authentication Scheme," Journal of Computer Security, vol. 2, pp. 65-71, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 65-71
-
-
den Boer, B.1
-
6
-
-
84957630266
-
-
K. Kurosawa, S. Obana andW. Ogata, t-Cheater Identifiable (k, n) Secret Sharing Schemes, Proc. Crypto'95, Lecture Notes in Computer Science, 963, Springer Verlag, pp. 410-423, 1995.
-
K. Kurosawa, S. Obana andW. Ogata, "t-Cheater Identifiable (k, n) Secret Sharing Schemes," Proc. Crypto'95, Lecture Notes in Computer Science, vol. 963, Springer Verlag, pp. 410-423, 1995.
-
-
-
-
8
-
-
33847657638
-
Optimum Secret Sharing Scheme Secure against Cheating
-
W. Ogata, K. Kurosawa and D. R. Stinson, "Optimum Secret Sharing Scheme Secure against Cheating," SIAM Journal on Discrete Mathematics, vol. 20, no. 1, pp. 79-95, 2006.
-
(2006)
SIAM Journal on Discrete Mathematics
, vol.20
, Issue.1
, pp. 79-95
-
-
Ogata, W.1
Kurosawa, K.2
Stinson, D.R.3
-
9
-
-
84982943258
-
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
Proc. Crypto'91, 576, Springer Verlag, pp
-
T. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing," Proc. Crypto'91, Lecture Notes in Computer Science, vol 576, Springer Verlag, pp. 129-149, 1991.
-
(1991)
Lecture Notes in Computer Science
, pp. 129-149
-
-
Pedersen, T.1
-
10
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
11
-
-
0842305624
-
On the Connections between Universal Hashing, Combinatorial Designs and Error-Correcting Codes
-
D. R. Stinson, "On the Connections between Universal Hashing, Combinatorial Designs and Error-Correcting Codes," Congressus Numerantium 114, pp. 7-27, 1996.
-
(1996)
Congressus Numerantium
, vol.114
, pp. 7-27
-
-
Stinson, D.R.1
-
12
-
-
0024141971
-
How to Share a Secret with Cheaters
-
M. Tompa and H. Woll, "How to Share a Secret with Cheaters," Journal of Cryptology, vol. 1, no. 3, pp. 133-138, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
|