-
1
-
-
33845937691
-
A strong ramp secret sharing scheme using matrix projection
-
Niagara-Falls, Buffalo, NY, pp
-
Bai, L. (2006) 'A strong ramp secret sharing scheme using matrix projection', Second International Workshop on Trust, Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo, NY, pp.652-656.
-
(2006)
Second International Workshop on Trust, Security and Privacy for Ubiquitous Computing
, pp. 652-656
-
-
Bai, L.1
-
2
-
-
0032166974
-
Secret sharing with public reconstruction
-
Beimel, A. and Chor, B. (1998) 'Secret sharing with public reconstruction', IEEE Trans. Inform. Theory, Vol. 44, pp.1887-1896.
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, pp. 1887-1896
-
-
Beimel, A.1
Chor, B.2
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic faulttolerant distributed computation
-
2-4 May, Chicago, Illinois, pp
-
Ben-Or, M., Goldwasser, S. and Wigderson, A. (1988) 'Completeness theorems for non-cryptographic faulttolerant distributed computation', Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, 2-4 May, Chicago, Illinois, pp.1-10.
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
85062838317
-
Safeguarding cryptographic keys
-
June, Arlington, VA
-
Blakley, G. (1979) 'Safeguarding cryptographic keys', Proceedings of the AFIPS 1979 National Computer Conference, June, Arlington, VA, Vol. 48, pp.313-317.
-
(1979)
Proceedings of the AFIPS 1979 National Computer Conference
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
5
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
12-14 October, IEEE Computer Society, Los Angeles, California, pp
-
Feldman, P. (1987) 'A practical scheme for non-interactive verifiable secret sharing', Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (FOCS' 87), 12-14 October, IEEE Computer Society, Los Angeles, California, pp.427-437.
-
(1987)
Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (FOCS' 87)
, pp. 427-437
-
-
Feldman, P.1
-
6
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
New York City, NY, pp
-
Goldreich, O., Micali, S. and Wigderson, A. (1987) 'How to play any mental game or a completeness theorem for protocols with honest majority', Proceedings of the Nineteen Annual ACM Symposium on Theory of Computing, New York City, NY, pp.218-219.
-
(1987)
Proceedings of the Nineteen Annual ACM Symposium on Theory of Computing
, pp. 218-219
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
7
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Don Coppersmith Ed, August, Santa Barbara, CA, pp
-
Herzberg, A., Jarecki, S., Krawczyk, H. and Yung, M. (1995) 'Proactive secret sharing or: How to cope with perpetual leakage', in Don Coppersmith (Ed.): Advances in Cryptology - Crypto '95, August, Santa Barbara, CA, pp.339-352.
-
(1995)
Advances in Cryptology - Crypto '95
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
8
-
-
0020543282
-
On secret sharing systems
-
Karnin, E.D., Greene, J.W. and Hellman, M.E. (1983) 'On secret sharing systems', IEEE Trans. Inform. Theory, Vol. IT-29, pp.35-41.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
10
-
-
33144466119
-
MDS secret-sharing scheme secure against cheaters
-
Okada, K. and Kurosawa, K. (2000) 'MDS secret-sharing scheme secure against cheaters', IEEE Trans. Inform. Theory, Vol. 46, pp.1078-1081.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 1078-1081
-
-
Okada, K.1
Kurosawa, K.2
-
11
-
-
84982943258
-
Non-interactive and informationtheoretic secure verifiable secret sharing
-
Feigenbaum, J, Ed, Springer-Verlag, University of California in Santa Barbara, 11-15 August, pp
-
Pedersen, T.P. (1991) 'Non-interactive and informationtheoretic secure verifiable secret sharing', in Feigenbaum, J. (Ed.): Advances in Cryptology - Crypto'91, IACR, Springer-Verlag, University of California in Santa Barbara, 11-15 August, pp.129-140.
-
(1991)
Advances in Cryptology - Crypto'91, IACR
, pp. 129-140
-
-
Pedersen, T.P.1
-
12
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979) 'How to share a secret', Communications of the ACM Vol. 22, pp.612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
0028323999
-
Decomposition constructions for secret-sharing schemes
-
Stinson, D.R. (1994) 'Decomposition constructions for secret-sharing schemes', IEEE Trans. Inform. Theory, Vol. 40, pp.118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
-
15
-
-
23944434871
-
-
Springer, October, ISBN: 0387229701
-
Zou, X.K., Ramamurthy, B. and Magliveras, S. (2004) Secure Group Communication over Data Networks, Springer, October, ISBN: 0387229701.
-
(2004)
Secure Group Communication over Data Networks
-
-
Zou, X.K.1
Ramamurthy, B.2
Magliveras, S.3
|