-
1
-
-
33644602159
-
On the power of nonlinear secret sharing schemes
-
A. Beimel and Y. Ishai, On the power of nonlinear secret sharing schemes, SIAM J. Discrete Math. 19 (2005), 258-280.
-
(2005)
SIAM J. Discrete Math.
, vol.19
, pp. 258-280
-
-
Beimel, A.1
Ishai, Y.2
-
2
-
-
33745543756
-
On matroids and non-ideal secret sharing
-
DOI 10.1007/11681878-25, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
A. Beimel and N. Livne, On Matroids and Non-ideal Secret Sharing, Third Theory of Cryptography Conference, TCC 2006, Lecture Notes in Comput. Sci. 3876 (2006), 482-501. (Pubitemid 43979864)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 482-501
-
-
Beimel, A.1
Livne, N.2
-
3
-
-
40249109897
-
Matroids can be far from ideal secret sharing
-
A. Beimel, N. Livne, and C. Padró, Matroids Can Be Far From Ideal Secret Sharing, Fifth Theory of Cryptography Conference, TCC 2008, Lecture Notes in Comput. Sci. 4948 (2008), 194-212.
-
(2008)
Fifth Theory of Cryptography Conference, TCC 2008, Lecture Notes in Comput. Sci.
, vol.4948
, pp. 194-212
-
-
Beimel, A.1
Livne, N.2
Padró, C.3
-
4
-
-
70350660861
-
Secret sharing and non-shannon information inequalities
-
A. Beimel and I. Orlov, Secret Sharing and Non-Shannon Information Inequalities, Sixth Theory of Cryptography Conference, TCC 2009, Lecture Notes in Comput. Sci. 5444 (2009), 539-557.
-
(2009)
Sixth Theory of Cryptography Conference, TCC 2009, Lecture Notes in Comput. Sci.
, vol.5444
, pp. 539-557
-
-
Beimel, A.1
Orlov, I.2
-
5
-
-
24144494482
-
Characterizing ideal weighted threshold secret sharing
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
A. Beimel, T. Tassa, and E. Weinreb, Characterizing Ideal Weighted Threshold Secret Sharing, Second Theory of Cryptography Conference, TCC 2005, Lecture Notes in Comput. Sci. 3378 (2005), 600-619. (Pubitemid 41231185)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 600-619
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
6
-
-
27144471932
-
Separating the power of monotone span programs over different fields
-
DOI 10.1137/S0097539704444038
-
A. Beimel and E. Weinreb, Separating the power of monotone span programs over different fields, SIAM J. Comput. 34 (2005), 1196-1215. (Pubitemid 41495292)
-
(2005)
SIAM Journal on Computing
, vol.34
, Issue.5
, pp. 1196-1215
-
-
Beimel, A.1
Weinreb, E.2
-
7
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions, Advances in Cryptology, CRYPTO'88, Lecture Notes in Comput. Sci. 403 (1990), 27-35.
-
(1990)
Advances in Cryptology, CRYPTO'88, Lecture Notes in Comput. Sci.
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
8
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. R. Blakley, Safeguarding cryptographic keys, AFIPS Conference Proceedings 48 (1979), 313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
9
-
-
21844502521
-
On general perfect secret sharing schemes
-
G. R. Blakley and G.A. Kabatianski, On General Perfect Secret Sharing Schemes, Advances in Cryptology, CRYPTO'95, Lecture Notes in Comput. Sci. 963 (1995), 367-371.
-
(1995)
Advances in Cryptology, CRYPTO'95, Lecture Notes in Comput. Sci.
, vol.963
, pp. 367-371
-
-
Blakley, G.R.1
Kabatianski, G.A.2
-
10
-
-
0001003172
-
Tight bounds on the information rate of secret sharing schemes
-
C. Blundo, A. De Santis, R. De Simone, and U. Vaccaro, Tight bounds on the information rate of secret sharing schemes, Des. Codes Cryptogr. 11 (1997), 107-122. (Pubitemid 127502285)
-
(1997)
Designs, Codes, and Cryptography
, vol.11
, Issue.2
, pp. 107-122
-
-
Blundo, C.1
De Santis, A.2
De Simone, R.3
Vaccaro, U.4
-
11
-
-
85028751599
-
On the information rate of secret sharing schemes
-
C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, On the information rate of secret sharing schemes, Advances in Cryptology, CRYPTO'92. Lecture Notes in Comput. Sci. 740 (1993), 148-167.
-
(1993)
Advances in Cryptology, CRYPTO'92. Lecture Notes in Comput. Sci.
, vol.740
, pp. 148-167
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
12
-
-
0029631974
-
Graph decompositions and secret sharing schemes
-
C. Blundo, A. De Santis, D.R. Stinson, and U. Vaccaro, Graph decompositions and secret sharing schemes, J. Cryptology 8 (1995), 39-64.
-
(1995)
J. Cryptology
, vol.8
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
14
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E. F. Brickell and D.M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology 4 (1991), 123-134.
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
15
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
E. F. Brickell and D. R. Stinson, Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptology 5 (1992), 153-166. (Pubitemid 23607284)
-
(1992)
Journal of Cryptology
, vol.5
, Issue.3
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
16
-
-
0027607213
-
On the size of shares of secret sharing schemes
-
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the size of shares of secret sharing schemes, J. Cryptology 6 (1993), 157-168.
-
(1993)
J. Cryptology
, vol.6
, pp. 157-168
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
18
-
-
0001607361
-
The size of a share must be large
-
L. Csirmaz, The size of a share must be large, J. Cryptology 10 (1997), 223-231. (Pubitemid 127754573)
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
, pp. 223-231
-
-
Csirmaz, L.1
-
19
-
-
33744546371
-
Improved constructions of secret sharing schemes by applying decompositions
-
DOI 10.1016/j.ipl.2006.01.016, PII S0020019006001116
-
M. van Dijk, T. Kevenaar, G. Schrijen, and P. Tuyls, Improved constructions of secret sharing schemes by applying .-decompositions, Inf. Process. Lett. 99 (2006), 154-157. (Pubitemid 43816995)
-
(2006)
Information Processing Letters
, vol.99
, Issue.4
, pp. 154-157
-
-
Van Dijk, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Tuyls, P.4
-
20
-
-
33846049315
-
Six new non-shannon information inequalities
-
DOI 10.1109/ISIT.2006.261840, 4035957, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
R. Dougherty, C. Freiling, and K. Zeger, Six new non-Shannon information inequalities, In IEEE International Symposium on Information Theory (ISIT) (2006) 233-236. (Pubitemid 351244088)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 233-236
-
-
Dougherty, R.1
Freiling, C.2
Zeger, K.3
-
22
-
-
0017955317
-
Entropy functions and polymatroids-combinatorial structures in information theory
-
S. Fujishige, Entropy functions and polymatroids-combinatorial structures in information theory, Electron. Comm. Japan 61 (1978), 14-18. (Pubitemid 10441095)
-
(1978)
Electronics & communications in Japan
, vol.61
, Issue.4
, pp. 14-18
-
-
Fujishige, S.1
-
23
-
-
0018020371
-
Polymatroidal dependence structure of a set of random variables
-
S. Fujishige, Polymatroidal Dependence Structure of a Set of Random Variables, Information and Control 39 (1978), 55-72. (Pubitemid 9408951)
-
(1978)
Inf Control
, vol.39
, Issue.1
, pp. 55-72
-
-
Fujishige, S.1
-
24
-
-
0031623892
-
A characterization of span program size and improved lower bounds for monotone span programs
-
A. Gál, A characterization of span program size and improved lower bounds for monotone span programs, Proceedings of 30th ACM Symposium on the Theory of Computing, STOC 1998 (1998), 429-437.
-
(1998)
Proceedings of 30th ACM Symposium on the Theory of Computing, STOC 1998
, pp. 429-437
-
-
Gál, A.1
-
25
-
-
0023543848
-
Secret sharing scheme realizing any access structure
-
M. Ito, A. Saito, and T. Nishizeki, Secret sharing scheme realizing any access structure, Proc. IEEE Globecom'87 (1987), 99-102. (Pubitemid 18628648)
-
(1987)
Proc. IEEE Globecom'87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
26
-
-
0013483720
-
Geometric secret sharing schemes and their duals
-
W.-A. Jackson and K. M. Martin, Geometric secret sharing schemes and their duals, Des. Codes Cryptogr. 4 (1994), 83-95.
-
(1994)
Des. Codes Cryptogr.
, vol.4
, pp. 83-95
-
-
Jackson, W.-A.1
Martin, K.M.2
-
27
-
-
0001652944
-
Perfect secret sharing schemes on five participants
-
W.-A. Jackson and K. M. Martin, Perfect secret sharing schemes on five participants, Des. Codes Cryptogr. 9 (1996), 267-286. (Pubitemid 126708419)
-
(1996)
Designs, Codes, and Cryptography
, vol.9
, Issue.3
, pp. 267-286
-
-
Jackson, W.-A.1
Martin, K.M.2
-
28
-
-
0020543282
-
On secret sharing systems
-
E. D. Karnin, J.W. Greene, and M. E. Hellman, On secret sharing systems, IEEE Trans. Inform. Theory 29 (1983), 35-41.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
29
-
-
0001530822
-
A solution of the Shannon switching game
-
A. Lehman, A solution of the Shannon switching game, J. Soc. Indust. Appl. Math. 12 (1964), 687-725.
-
(1964)
J. Soc. Indust. Appl. Math.
, vol.12
, pp. 687-725
-
-
Lehman, A.1
-
31
-
-
0041415983
-
A new class of non-Shannon type inequalities for entropies
-
K. Makarychev, Y. Makarychev, A. Romashchenko, and N. Vereshchagin, A new class of non-Shannon type inequalities for entropies, Communications in Information and Systems 2 (2002), 147-166.
-
(2002)
Communications in Information and Systems
, vol.2
, pp. 147-166
-
-
Makarychev, K.1
Makarychev, Y.2
Romashchenko, A.3
Vereshchagin, N.4
-
32
-
-
14644407439
-
Secret sharing schemes with three or four minimal qualified subsets
-
DOI 10.1007/s10623-003-4192-1, PIPS5384192
-
J. Martí-Farré and C. Padró, Secret sharing schemes with three or four minimal qualified subsets, Des. Codes Cryptogr. 34 (2005), 17-34. (Pubitemid 40308070)
-
(2005)
Designs, Codes, and Cryptography
, vol.34
, Issue.1
, pp. 17-34
-
-
Marti-Farre, J.1
Padro, C.2
-
33
-
-
32144455532
-
Secret sharing schemes on access structures with intersection number equal to one
-
DOI 10.1016/j.dam.2005.09.003, PII S0166218X05002702
-
J. Martí-Farré and C. Padró, Secret sharing schemes on access structures with intersection number equal to one, Discrete Applied Mathematics 154 (2006), 552-563. (Pubitemid 43207392)
-
(2006)
Discrete Applied Mathematics
, vol.154
, Issue.3
, pp. 552-563
-
-
Marti-Farre, J.1
Padro, C.2
-
34
-
-
0345884729
-
Matroid representations by partitions
-
PII S0012365X99000047
-
F. Matúš, Matroid representations by partitions, Discrete Math. 203 (1999), 169-194. (Pubitemid 129604254)
-
(1999)
Discrete Mathematics
, vol.203
, Issue.1-3
, pp. 169-194
-
-
Matus, F.1
-
37
-
-
0004061262
-
-
Oxford Science Publications. The Clarendon Press, Oxford University Press, New York
-
J. G. Oxley, Matroid theory. Oxford Science Publications. The Clarendon Press, Oxford University Press, New York, 1992.
-
(1992)
Matroid Theory
-
-
Oxley, J.G.1
-
38
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
DOI 10.1109/18.887867
-
C. Padró and G. Sáez, Secret sharing schemes with bipartite access structure, IEEE Trans. Inform. Theory 46 (2000), 2596-2604. (Pubitemid 32090036)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.7
, pp. 2596-2604
-
-
Padro, C.1
Saez, G.2
-
39
-
-
0037200862
-
Lower bounds on the information rate of secret sharing schemes with homogeneous access structure
-
DOI 10.1016/S0020-0190(02)00213-2, PII S0020019002002132
-
C. Padró and G. Sáez, Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. Inform. Process. Lett. 83 (2002), 345-351. (Pubitemid 34808434)
-
(2002)
Information Processing Letters
, vol.83
, Issue.6
, pp. 345-351
-
-
Padro, C.1
Saez, G.2
-
40
-
-
0039935716
-
A forbidden minor characterization of matroid ports
-
P. D. Seymour, A forbidden minor characterization of matroid ports, Quart. J. Math. Oxford Ser. 27 (1976), 407-413.
-
(1976)
Quart. J. Math. Oxford Ser.
, vol.27
, pp. 407-413
-
-
Seymour, P.D.1
-
41
-
-
38249009286
-
On secret-sharing matroids
-
P. D. Seymour, On secret-sharing matroids, J. Combin. Theory Ser. B 56 (1992), 69-73.
-
(1992)
J. Combin. Theory Ser. B
, vol.56
, pp. 69-73
-
-
Seymour, P.D.1
-
42
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Commun. of the ACM 22 (1979), 612-613.
-
(1979)
Commun. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
43
-
-
0011309023
-
Almost affine codes
-
J. Simonis and A. Ashikhmin, Almost affine codes, Des. Codes Cryptogr. 14 (1998), 179-197. (Pubitemid 128507639)
-
(1998)
Designs, Codes, and Cryptography
, vol.14
, Issue.2
, pp. 179-197
-
-
Simonis, J.1
Ashikhmin, A.2
-
44
-
-
0000708528
-
An explication of secret sharing schemes
-
D. R. Stinson, An explication of secret sharing schemes, Des. Codes Cryptogr. 2 (1992), 357-390.
-
(1992)
Des. Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
45
-
-
85028945826
-
New general lower bounds on the information rate of secret sharing schemes
-
D. R. Stinson, New general lower bounds on the information rate of secret sharing schemes, Advances in Cryptology, CRYPTO'92, Lecture Notes in Comput. Sci. 740 (1993), 168-182.
-
(1993)
Advances in Cryptology, CRYPTO'92, Lecture Notes in Comput. Sci.
, vol.740
, pp. 168-182
-
-
Stinson, D.R.1
-
46
-
-
0028323999
-
Decomposition constructions for secret-sharing schemes
-
D. R. Stinson, Decomposition constructions for secret-sharing schemes, IEEE Trans. Inform. Theory 40 (1994), 118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
-
48
-
-
0032124111
-
On characterization of entropy function via information inequalities
-
PII S001894489803630X
-
Z. Zhang and R.W. Yeung, On characterization of entropy function via information inequalities, IEEE Trans. Inform. Theory 44 (1998), 1440-1452. (Pubitemid 128736707)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.4
, pp. 1440-1452
-
-
Zhang, Z.1
Yeung, R.W.2
|