메뉴 건너뛰기




Volumn 1403, Issue , 1998, Pages 500-511

Secret sharing schemes with bipartite access structure

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; EQUIVALENCE CLASSES;

EID: 84885829587     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0054149     Document Type: Conference Paper
Times cited : (7)

References (16)
  • 2
  • 7
    • 0000849681 scopus 로고
    • On the Classification of Ideal Secret Sharing Schemes
    • E. F. Brickell, D. M. Davenport. On the Classification of Ideal Secret Sharing Schemes. J. Cryptology 4 (1991) 123-134.
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 8
    • 0026992660 scopus 로고
    • Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
    • E.F. Brickell and D.R. Stinson. Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. J. Cryptology 5 (1992) 153-166.
    • (1992) J. Cryptology , vol.5 , pp. 153-166
    • Brickell, E.F.1    Stinson, D.R.2
  • 9
    • 85029546799 scopus 로고    scopus 로고
    • On the Size of Shares of Secret Sharing Schemes
    • Lecture Notes in Computer Science 576, Springer-Verlag, To appear in J. Of Cryptology
    • R. M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro. On the Size of Shares of Secret Sharing Schemes. In Advances in Cryptology-CRYPTO 91, Lecture Notes in Computer Science 576, Springer-Verlag, 101-113. To appear in J. Of Cryptology.
    • Advances in Cryptology-CRYPTO 91 , pp. 101-113
    • Capocelli, R.M.1    De Santis, A.2    Gargano, L.3    Vaccaro, U.4
  • 10
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. of the ACM 22 (1979) 612-613.
    • (1979) Commun. Of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 13
    • 0003038453 scopus 로고
    • An Introduction to Shared Secret and/or Shared Control Schemes and Their Application
    • IEEE Press
    • G.J. Simmons. An Introduction to Shared Secret and/or Shared Control Schemes and Their Application. Contemporary Cryptology. The Science of Information Integrity. IEEE Press (1991) 441-497.
    • (1991) Contemporary Cryptology. The Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 14
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D.R. Stinson. An explication of secret sharing schemes. Designs, Codes and Cryptography 2 (1992) 357-390.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 15
    • 0028323999 scopus 로고
    • Decomposition Constructions for Secret-Sharing Schemes
    • D.R. Stinson. Decomposition Constructions for Secret-Sharing Schemes. IEEE Trans, on Information Theory 40 (1994) 118-125.
    • (1994) IEEE Trans, on Information Theory , vol.40 , pp. 118-125
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.