-
1
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol.22, no.11, pp.612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
2
-
-
85062838317
-
Safeguarding cryptographic keys
-
G.R. Blakley, "Safeguarding cryptographic keys," Proc. AFIPS, vol.48, pp. 313-317, 1979.
-
(1979)
Proc. AFIPS
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
77951274121
-
A fast (2, n)-threshold scheme and its application
-
Y. Fujii, M. Tada, N. Hosaka, K. Tochikubo, and T. Kato, "A fast (2, n)-threshold scheme and its application," Proc. CSS2005, pp.631-636, 2005.
-
(2005)
Proc. CSS2005
, pp. 631-636
-
-
Fujii, Y.1
Tada, M.2
Hosaka, N.3
Tochikubo, K.4
Kato, T.5
-
4
-
-
77953451952
-
(2, n)- threshold secret sharing systems based on binary matrices
-
N. Hosaka, K. Tochikubo, Y. Fujii, M. Tada, and T. Kato, "(2, n)- threshold secret sharing systems based on binary matrices," Proc. SCIS2007, 2D1-4, 2007.
-
(2007)
Proc. SCIS2007, 2D1-4
-
-
Hosaka, N.1
Tochikubo, K.2
Fujii, Y.3
Tada, M.4
Kato, T.5
-
5
-
-
56649096110
-
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations
-
Jan.
-
J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, "A fast (3, n)-threshold secret sharing scheme using exclusive-or operations," IEICE Trans. Fundamentals, vol.E91-A, no.1, pp. 127-138, Jan. 2008.
-
(2008)
IEICE Trans. Fundamentals
, vol.E91-A
, Issue.1
, pp. 127-138
-
-
Kurihara, J.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
-
6
-
-
77951265684
-
How to convert 1-out-of-n proof into k-out-of-n proof
-
N. Shiina, T. Okamoto, and E. Okamoto, "How to convert 1-out-of-n proof into k-out-of-n proof," Proc. SCIS2004, pp. 1435-1440, 2004.
-
(2004)
Proc. SCIS2004
, pp. 1435-1440
-
-
Shiina, N.1
Okamoto, T.2
Okamoto, E.3
-
7
-
-
56649120777
-
A note on information rate for fast threshold schemes
-
H. Kunii and M. Tada, "A note on information rate for fast threshold schemes," Proc. CSS2006, pp. 101-106, 2006.
-
(2006)
Proc. CSS2006
, pp. 101-106
-
-
Kunii, H.1
Tada, M.2
-
8
-
-
0020543282
-
On secret sharing systems
-
E.D. Karnin, J.W. Greene, and M.E. Hellman, "On secret sharing systems," IEEE Trans. Inf. Theory, vol.29, no.1, pp35-41, 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
9
-
-
0027607213
-
On the size of shares for secret sharing schemes
-
R.M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, "On the size of shares for secret sharing schemes," J. Cryptol., vol.6, pp.35-41, 1983.
-
(1983)
J. Cryptol.
, vol.6
, pp. 35-41
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
10
-
-
85028751599
-
On the information rate of secret sharing schemes
-
Springer-Verlag
-
C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, "On the information rate of secret sharing schemes," Proc. CRYPTO'92, LNCS 740, pp.149-169, Springer-Verlag, 1993.
-
(1993)
Proc. CRYPTO'92, LNCS 740
, pp. 149-169
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
11
-
-
0028323999
-
Decomposition constructions for secret sharing schemes
-
D.R. Stinson, "Decomposition constructions for secret sharing schemes," IEEE Trans. Inf. Theory, vol.40, no.1, pp.118-125, 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.1
, pp. 118-125
-
-
Stinson, D.R.1
-
13
-
-
84961369151
-
Security of ramp schemes
-
Springer-Verlag
-
G.R. Blakley and C. Meadows, "Security of ramp schemes," Proc. CRYPTO'84, LNCS 196, pp.242-269, Springer-Verlag, 1985.
-
(1985)
Proc. CRYPTO'84, LNCS 196
, pp. 242-269
-
-
Blakley, G.R.1
Meadows, C.2
-
14
-
-
0141913937
-
On secret sharing systems using (k,L,n) threshold scheme
-
Sept.
-
H. Yamamoto, "On secret sharing systems using (k,L,n) threshold scheme," IEICE Trans. Fundamentals (Japanese Edition), vol.J68-A, no.9, pp.945-952, Sept. 1985.
-
(1985)
IEICE Trans. Fundamentals (Japanese Edition)
, vol.J68-A
, Issue.9
, pp. 945-952
-
-
Yamamoto, H.1
|