-
2
-
-
61849155741
-
Characterizing ideal weighted threshold secret sharing
-
A preliminary version appeared in The Proceeding of TCC, pp. 600-619 (2005)
-
Beimel A., Tassa T., Weinreb E.: Characterizing ideal weighted threshold secret sharing. SIAM J. Disc. Math. 22, 360-397 (2008). A preliminary version appeared in The Proceeding of TCC, pp. 600-619 (2005).
-
(2008)
SIAM J. Disc. Math.
, vol.22
, pp. 360-397
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
6
-
-
0000354685
-
Some ideal secret sharing schemes
-
0685.94003 1025010
-
E.F. Brickell 1989 Some ideal secret sharing schemes J. Combin. Math. Combin. Comput. 6 105 113 0685.94003 1025010
-
(1989)
J. Combin. Math. Combin. Comput.
, vol.6
, pp. 105-113
-
-
Brickell, E.F.1
-
7
-
-
0022080529
-
A randomized protocol for signing contracts
-
DOI 10.1145/3812.3818
-
S. Even O. Goldreich A. Lempel 1985 A randomized protocol for signing contracts Commun. ACM 28 637 647 10.1145/3812.3818 800680 (Pubitemid 15569164)
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even Shimon1
Goldreich Oded2
Lempel Abraham3
-
8
-
-
0030150177
-
Information without leaking it
-
10.1145/229459.229469
-
R. Fagin M. Naor P. Winkler 1996 information without leaking it Commun. ACM 39 77 85 10.1145/229459.229469
-
(1996)
Commun. ACM
, vol.39
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
9
-
-
79551498584
-
On the Optimization of Bipartite Secret Sharing Schemes
-
Farràs O., Metcalf-Burton J.R., Padró C., Vázquez L.: On the Optimization of Bipartite Secret Sharing Schemes. In: ICITS (2009).
-
(2009)
ICITS
-
-
Farràs, O.1
-
11
-
-
85032194875
-
How to solve any protocol problem: An efficiency improvement
-
O. Goldreich R. Vainish 1987 How to solve any protocol problem: an efficiency improvement Adv. Cryptol. (CRYPTO), LNCS. 293 73 86
-
(1987)
Adv. Cryptol. (CRYPTO), LNCS.
, vol.293
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
12
-
-
0030718794
-
Private simultaneous messages protocols with applications
-
IEEE Computer Society
-
Ishai Y., Kushilevitz E.: Private simultaneous messages protocols with applications. In: Proceeding of ISTCS97, IEEE Computer Society, pp. 174-184 (1997).
-
(1997)
Proceeding of ISTCS97
, pp. 174-184
-
-
Ishai, Y.1
Kushilevitz, E.2
-
14
-
-
84947426400
-
M out of n oblivious transfer
-
Mu Y., Zhang J., Varadharajan V.: m out of n oblivious transfer. ACISP 2002, LNCS, vol. 2384, pp. 395-405 (2002).
-
(2002)
ACISP 2002, LNCS
, vol.2384
, pp. 395-405
-
-
Mu, Y.1
Zhang, J.2
Varadharajan, V.3
-
16
-
-
22044454088
-
Computationally secure oblivious transfer
-
DOI 10.1007/s00145-004-0102-6
-
M. Naor B. Pinkas 2005 Computationally secure oblivious transfer J. Cryptol. 18 1 35 1075.68026 10.1007/s00145-004-0102-6 2117613 (Pubitemid 40963344)
-
(2005)
Journal of Cryptology
, vol.18
, Issue.1
, pp. 1-35
-
-
Naor, M.1
Pinkas, B.2
-
17
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computation Laboratory
-
Rabin M.O.: How to exchange secrets by oblivious transfer. Tech. Memo TR-81, Aiken Computation Laboratory (1981).
-
(1981)
Tech. Memo TR-81
-
-
Rabin, M.O.1
-
18
-
-
39149127324
-
Alternative protocols for generalized oblivious transfer
-
Shankar B., Srinathan K., Pandu Rangan C.: Alternative protocols for generalized oblivious transfer. In: Proceeding of ICDCN08, LNCS, vol. 4904, pp. 304-309 (2008).
-
(2008)
Proceeding of ICDCN08, LNCS
, vol.4904
, pp. 304-309
-
-
Shankar, B.1
Srinathan, K.2
Pandu Rangan, C.3
-
19
-
-
33947522725
-
Hierarchical threshold secret sharing
-
An earlier version appeared in Proceeding of the First Theory of Cryptography Conference, pp. 473-490 (2004)
-
Tassa T.: Hierarchical threshold secret sharing. J. Cryptol. 20, 237-264 (2007). An earlier version appeared in Proceeding of the First Theory of Cryptography Conference, pp. 473-490 (2004).
-
(2007)
J. Cryptol.
, vol.20
, pp. 237-264
-
-
Tassa, T.1
|