-
1
-
-
0028429265
-
Universally ideal secret sharing schemes
-
A. BEIMEL AND B. CHOR, Universally ideal secret sharing schemes, IEEE Trans. Inform. Theory, 40 (1994), pp. 786-794.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 786-794
-
-
BEIMEL, A.1
CHOR, B.2
-
2
-
-
27844491900
-
Monotone circuits for monotone weighted threshold functions
-
A. BEIMEL AND E. WEINREB, Monotone circuits for monotone weighted threshold functions, Inform. Process. Lett., 97 (2006), pp. 12-18.
-
(2006)
Inform. Process. Lett
, vol.97
, pp. 12-18
-
-
BEIMEL, A.1
WEINREB, E.2
-
3
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
Chicago, IL, ACM, New York, pp
-
M. BEN-OR, S. GOLDWASSER, AND A. WIGDERSON, Completeness theorems for noncryptographic fault-tolerant distributed computations, in Proceedings of the 20th ACM Symposium on the Theory of Computing, Chicago, IL, 1988, ACM, New York, pp. 1-10.
-
(1988)
Proceedings of the 20th ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
BEN-OR, M.1
GOLDWASSER, S.2
WIGDERSON, A.3
-
4
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
Advances in Cryptology-CRYPTO '88, S. Goldwasser, ed, Springer-Verlag, New York
-
J. BENALOH AND J. LEICHTER, Generalized secret sharing and monotone functions, in Advances in Cryptology-CRYPTO '88, S. Goldwasser, ed., Lecture Notes in Comput. Sci. 403, Springer-Verlag, New York, 1990, pp. 27-35.
-
(1990)
Lecture Notes in Comput. Sci
, vol.403
, pp. 27-35
-
-
BENALOH, J.1
LEICHTER, J.2
-
5
-
-
85062838317
-
-
G. R. BLAKLEY, Safeguarding cryptographic keys, in Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, eds., 48 of AFIPS Conference proceedings, AFIPS (American Federation of Information Processing Societies) Press, 1979, pp. 313-317.
-
G. R. BLAKLEY, Safeguarding cryptographic keys, in Proceedings of the 1979 AFIPS National Computer Conference, R. E. Merwin, J. T. Zanca, and M. Smith, eds., vol. 48 of AFIPS Conference proceedings, AFIPS (American Federation of Information Processing Societies) Press, 1979, pp. 313-317.
-
-
-
-
7
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. BRICKELL AND D. M. DAVENPORT, On the classification of ideal secret sharing schemes, J. Cryptology, 4 (1991), pp. 123-134.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
BRICKELL, E.F.1
DAVENPORT, D.M.2
-
8
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. F. BRICKELL AND D. R. STINSON, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology, 5 (1992), pp. 153-166.
-
(1992)
J. Cryptology
, vol.5
, pp. 153-166
-
-
BRICKELL, E.F.1
STINSON, D.R.2
-
9
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R. M. CAPOCELLI, A. DE SANTIS, L. GARGANO, AND U. VACCARO, On the size of shares for secret sharing schemes, J. Cryptology, 6 (1993), pp. 157-168.
-
(1993)
J. Cryptology
, vol.6
, pp. 157-168
-
-
CAPOCELLI, R.M.1
DE SANTIS, A.2
GARGANO, L.3
VACCARO, U.4
-
10
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Chicago, IL, ACM, New York, pp
-
D. CHAUM, C. CRÉPEAU, AND I. DAMGÅRD, Multiparty unconditionally secure protocols, in Proceedings of the 20th ACM Symposium on the Theory of Computing, Chicago, IL, 1988, ACM, New York, pp. 11-19.
-
(1988)
Proceedings of the 20th ACM Symposium on the Theory of Computing
, pp. 11-19
-
-
CHAUM, D.1
CRÉPEAU, C.2
DAMGÅRD, I.3
-
11
-
-
79959295128
-
A Note on Ideal Tripartite Access Structures
-
Technical Report 2002/193, Cryptology ePrint Archive, 2002, online at
-
M. J. COLLINS, A Note on Ideal Tripartite Access Structures, Technical Report 2002/193, Cryptology ePrint Archive, 2002, online at http://eprint.iacr.org/.
-
-
-
COLLINS, M.J.1
-
12
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
B. Preneel, ed, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York
-
R. CRAMER, I. DAMGÅRD, AND U. MAURER, General secure multi-party computation from any linear secret-sharing scheme, in Advances in Cryptology - EUROCRYPT 2000, B. Preneel, ed., Lecture Notes in Comput. Sci. 1807, Springer-Verlag, New York, 2000, pp. 316-334.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 316-334
-
-
CRAMER, R.1
DAMGÅRD, I.2
MAURER, U.3
-
13
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Advances in Cryptology-CRYPTO '91, J. Feigenbaum, ed, Springer-Verlag, New York
-
Y. DESMEDT AND Y. FRANKEL, Shared generation of authenticators and signatures, in Advances in Cryptology-CRYPTO '91, J. Feigenbaum, ed., Lecture Notes in Comput. Sci. 576, Springer-Verlag, New York, 1992, pp. 457-469.
-
(1992)
Lecture Notes in Comput. Sci
, vol.576
, pp. 457-469
-
-
DESMEDT, Y.1
FRANKEL, Y.2
-
14
-
-
38049112844
-
Ideal multipartite secret sharing schemes
-
Advances in Cryptology-EUROCRYPT 2007, M. Naor, ed, Springer-Verlag, New York
-
O. FARRAS, J. MARTÍ-FARRÉ, AND C. PADRÓ, Ideal multipartite secret sharing schemes, in Advances in Cryptology-EUROCRYPT 2007, M. Naor, ed., Lecture Notes in Comput. Sci. 4515, Springer-Verlag, New York, 2007, pp. 448-465.
-
(2007)
Lecture Notes in Comput. Sci
, vol.4515
, pp. 448-465
-
-
FARRAS, O.1
MARTÍ-FARRÉ, J.2
PADRÓ, C.3
-
15
-
-
33746366452
-
New Results on Multipartite Access Structures
-
Technical Report 2006/048, Cryptology ePrint Archive, 2006, online at
-
J. HERRANZ AND G. SÁEZ, New Results on Multipartite Access Structures, Technical Report 2006/048, Cryptology ePrint Archive, 2006, online at http://eprint.iacr.org/.
-
-
-
HERRANZ, J.1
SÁEZ, G.2
-
16
-
-
0023543848
-
Secret sharing schemes realizing general access structure
-
IEEE Press, Piscataway, NJ, pp
-
M. ITO, A. SAITO, AND T. NISHIZEKI, Secret sharing schemes realizing general access structure, in Proceedings of the IEEE Global Telecommunication Conference, Globecom 87, 1987, IEEE Press, Piscataway, NJ, pp. 99-102.
-
(1987)
Proceedings of the IEEE Global Telecommunication Conference, Globecom
, vol.87
, pp. 99-102
-
-
ITO, M.1
SAITO, A.2
NISHIZEKI, T.3
-
17
-
-
0013229183
-
Ideal secret sharing schemes with multiple secrets
-
W. JACKSON, K. M. MARTIN, AND C. M. O'KEEFE, Ideal secret sharing schemes with multiple secrets, J. Cryptology, 9 (1996), pp. 233-250.
-
(1996)
J. Cryptology
, vol.9
, pp. 233-250
-
-
JACKSON, W.1
MARTIN, K.M.2
O'KEEFE, C.M.3
-
18
-
-
0027154548
-
On span programs
-
Boston, IEEE Press, Piscataway, NJ, pp
-
M. KARCHMER AND A. WIGDERSON, On span programs, in Proceedings of the 8th IEEE Conference on Structure in Complexity Theory, Boston, 1993, IEEE Press, Piscataway, NJ, pp. 102-111.
-
(1993)
Proceedings of the 8th IEEE Conference on Structure in Complexity Theory
, pp. 102-111
-
-
KARCHMER, M.1
WIGDERSON, A.2
-
19
-
-
0020543282
-
On secret sharing systems
-
E. D. KARNIN, J. W. GREENE, AND M. E. HELLMAN, On secret sharing systems, IEEE Trans. Inform. Theory, 29 (1983), pp. 35-41.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 35-41
-
-
KARNIN, E.D.1
GREENE, J.W.2
HELLMAN, M.E.3
-
20
-
-
32144455532
-
Secret sharing schemes on access structures with intersection number equal to one
-
J. MARTÍ-FARRÉ AND C. PADRÓ, Secret sharing schemes on access structures with intersection number equal to one, Discrete Appl. Math., 154 (2006), pp. 552-563.
-
(2006)
Discrete Appl. Math
, vol.154
, pp. 552-563
-
-
MARTÍ-FARRÉ, J.1
PADRÓ, C.2
-
21
-
-
0012179279
-
-
Ph.D. thesis, Applied Mathematics and Computation, University of London, London
-
K. M. MARTIN, Discrete Structures in the Theory of Secret Sharing, Ph.D. thesis, Applied Mathematics and Computation, University of London, London, 1991.
-
(1991)
Discrete Structures in the Theory of Secret Sharing
-
-
MARTIN, K.M.1
-
22
-
-
0002885219
-
New secret sharing schemes from old
-
K. M. MARTIN, New secret sharing schemes from old, J. Combin. Math. Combin. Comput., 14 (1993), pp. 65-77.
-
(1993)
J. Combin. Math. Combin. Comput
, vol.14
, pp. 65-77
-
-
MARTIN, K.M.1
-
23
-
-
0033591581
-
Weighted threshold secret sharing schemes
-
P. MORILLO, C. PADRÓ, G. SÁEZ, AND J. L. VILLAR, Weighted threshold secret sharing schemes, Inform. Process. Lett., 70 (1999), pp. 211-216.
-
(1999)
Inform. Process. Lett
, vol.70
, pp. 211-216
-
-
MORILLO, P.1
PADRÓ, C.2
SÁEZ, G.3
VILLAR, J.L.4
-
24
-
-
0004061262
-
-
Oxford University Press, London
-
J. G. OXLEY, Matroid Theory, Oxford University Press, London, 1992.
-
(1992)
Matroid Theory
-
-
OXLEY, J.G.1
-
25
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
C. PADRÓ AND G. SÁEZ, Secret sharing schemes with bipartite access structure, IEEE Trans. Inform. Theory, 46 (2000), pp. 2596-2605.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 2596-2605
-
-
PADRÓ, C.1
SÁEZ, G.2
-
26
-
-
0020881178
-
Randomized Byzantine generals
-
Tucson, AZ, IEEE Press, Piscataway, NJ, pp
-
M. O. RABIN, Randomized Byzantine generals, in Proceedings of the 24th IEEE Symposium on Foundations of Computer Science, Tucson, AZ, 1983, IEEE Press, Piscataway, NJ, pp. 403-409.
-
(1983)
Proceedings of the 24th IEEE Symposium on Foundations of Computer Science
, pp. 403-409
-
-
RABIN, M.O.1
-
27
-
-
38249009286
-
On secret-sharing matroids
-
P. D. SEYMOUR, On secret-sharing matroids, J. Combin. Theory Ser. B, 56 (1992), pp. 69-73.
-
(1992)
J. Combin. Theory Ser. B
, vol.56
, pp. 69-73
-
-
SEYMOUR, P.D.1
-
28
-
-
0018545449
-
HOW to share a secret
-
A. SHAMIR, HOW to share a secret, Comm. ACM, 22 (1979), pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
SHAMIR, A.1
-
29
-
-
84898132112
-
HOW to (really) share a secret
-
Advances in Cryptology-CRYPTO '88, S. Goldwasser, ed, Springer-Verlag, New York
-
G. J. SIMMONS, HOW to (really) share a secret, in Advances in Cryptology-CRYPTO '88, S. Goldwasser, ed., Lecture Notes in Comput. Sci. 403, Springer-Verlag, New York, 1990, pp. 390-448.
-
(1990)
Lecture Notes in Comput. Sci
, vol.403
, pp. 390-448
-
-
SIMMONS, G.J.1
-
30
-
-
0003038453
-
An introduction to shared secret and/or shared control and their application
-
Integrity, G. J. Simmons, ed, IEEE Press, Piscataway, NJ
-
G. J. SIMMONS, An introduction to shared secret and/or shared control and their application, in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, Piscataway, NJ, 1992, pp. 441-497.
-
(1992)
Contemporary Cryptology, The Science of Information
, pp. 441-497
-
-
SIMMONS, G.J.1
-
31
-
-
0003128147
-
The geometry of shared secret schemes
-
G. J. SIMMONS, W. JACKSON, AND K. M. MARTIN, The geometry of shared secret schemes, Bulletin of the Institute of Combinatorics and Its Applications, 1 (1991), pp. 71-88.
-
(1991)
Bulletin of the Institute of Combinatorics and Its Applications
, vol.1
, pp. 71-88
-
-
SIMMONS, G.J.1
JACKSON, W.2
MARTIN, K.M.3
-
32
-
-
0011309023
-
Almost affine codes
-
J. SIMONIS AND A. ASHIKHMIN, Almost affine codes, Designs, Codes and Cryptography, 14 (1998), pp. 179-197.
-
(1998)
Designs, Codes and Cryptography
, vol.14
, pp. 179-197
-
-
SIMONIS, J.1
ASHIKHMIN, A.2
-
33
-
-
0000708528
-
An explication of secret sharing schemes
-
D. R. STINSON, An explication of secret sharing schemes, Designs, Codes and Cryptography, 2 (1992), pp. 357-390.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
STINSON, D.R.1
-
34
-
-
85028945826
-
New general lower bounds on the information rate of secret sharing schemes
-
Advances in Cryptology-CRYPTO '92, E. F. Brickell, ed, Springer-Verlag, New York
-
D. R. STINSON, New general lower bounds on the information rate of secret sharing schemes, in Advances in Cryptology-CRYPTO '92, E. F. Brickell, ed., Lecture Notes in Comput. Sci. 740, Springer-Verlag, New York, 1993, pp. 168-182.
-
(1993)
Lecture Notes in Comput. Sci
, vol.740
, pp. 168-182
-
-
STINSON, D.R.1
-
35
-
-
33947522725
-
Hierarchical threshold secret sharing
-
T. TASSA, Hierarchical threshold secret sharing, J. Cryptology, 20 (2007), pp. 237-264.
-
(2007)
J. Cryptology
, vol.20
, pp. 237-264
-
-
TASSA, T.1
-
36
-
-
33746381973
-
Multipartite secret sharing by bivariate interpolation
-
Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, eds, Springer-Verlag, New York
-
T. TASSA AND N. DYN, Multipartite secret sharing by bivariate interpolation., in Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, eds., Lecture Notes in Comput. Sci. 4052, Springer-Verlag, New York, 2006, pp. 288-299.
-
(2006)
Lecture Notes in Comput. Sci
, vol.4052
, pp. 288-299
-
-
TASSA, T.1
DYN, N.2
|