-
1
-
-
85027202957
-
Generalized Secret Sharing and Monotone Functions
-
S. Goldwasser Ed., “Lecture Notes in Computer Science”, Vol. 403, Springer-Verlag, Berlin
-
J. C. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, in “Advances in Cryptology - Crypto ‘88”, S. Goldwasser Ed., “Lecture Notes in Computer Science”, Vol. 403, Springer-Verlag, Berlin, pp. 27-35, 1990.
-
(1990)
Advances in Cryptology - Crypto ‘88
, pp. 27-35
-
-
Benaloh, J.C.1
Leichter, J.2
-
2
-
-
0003723775
-
-
Bibliographisches Institut, Zurich
-
T. Beth, D. Jungnickel, and H. Lenz, Design Theory, Bibliographisches Institut, Zurich, 1985.
-
(1985)
Design Theory
-
-
Beth, T.1
Jungnickel, D.2
Lenz, H.3
-
3
-
-
85062838317
-
Safeguarding Cryptographic Keys
-
New York, NY, June
-
G. R. Blakley, Safeguarding Cryptographic Keys, Proceedings of AFIPS 1979 National Computer Conference, Vol. 48, New York, NY, pp. 313-317, June 1979.
-
(1979)
Proceedings of AFIPS 1979 National Computer Conference
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
4
-
-
85028751599
-
On the Information Rate of Secret Sharing Schemes
-
Ed. E. Brickell, “Lecture Notes in Computer Science”, Springer-Verlag, Berlin, To appear in Theoretical Computer Science
-
C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, On the Information Rate of Secret Sharing Schemes, in “Advances in Cryptology - CRYPTO ‘92”, Ed. E. Brickell, “Lecture Notes in Computer Science”, Vol. 740, Springer-Verlag, Berlin, pp. 149-169, 1993. To appear in Theoretical Computer Science.
-
(1993)
Advances in Cryptology - CRYPTO ‘92
, vol.740
, pp. 149-169
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
5
-
-
0029631974
-
Graph Decomposition and Secret Sharing Schemes
-
A prehminary version appeared in “Advances in Cryptology - Eurocrypt ‘92”, Lecture Notes in Computer Science, Vol. 658, R. Rueppel Ed., Springer-Verlag, pp. 1-24, 1993
-
C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph Decomposition and Secret Sharing Schemes, Journal of Cryptology, Voll 8, (1995), pp. 39-64. A prehminary version appeared in “Advances in Cryptology - Eurocrypt ‘92”, Lecture Notes in Computer Science, Vol. 658, R. Rueppel Ed., Springer-Verlag, pp. 1-24, 1993.
-
(1995)
Journal of Cryptology
, vol.8
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
6
-
-
85027395928
-
Randomness in Distribution Protocols
-
Serge Abiteboul and Eli Shamir Eds, di “Lecture Notes in Computer Science”, Springer-Verlag, Berlin
-
C. Blundo, A. De Santis, and U. Vaccaro, Randomness in Distribution Protocols, in “21st International Colloquium on Automata, Languages and Programming” (ICALP ‘94), Serge Abiteboul and Eli Shamir Eds., vol. 820 di “Lecture Notes in Computer Science”, Springer-Verlag, Berlin, pp. 568-579, 1994.
-
(1994)
21St International Colloquium on Automata, Languages and Programming (ICALP ‘94)
, vol.820
, pp. 568-579
-
-
Blundo, C.1
De Santis, A.2
Vaccaro, U.3
-
7
-
-
0000849681
-
On the Classification of Ideal Secret Sharing Schemes
-
E. F. Brickell and D. M. Davenport, On the Classification of Ideal Secret Sharing Schemes, J. Cryptology, Vol. 4, No. 2, pp. 123-124, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.2
, pp. 123-124
-
-
Brickell, E.F.1
Davenport, D.M.2
-
8
-
-
0026992660
-
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
-
E. F. Brickell and D. R. Stinson, Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes, J. Cryptology, Vol. 5, No. 3, pp. 153-166, 1992.
-
(1992)
J. Cryptology
, vol.5
, Issue.3
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
9
-
-
84948961485
-
A Note on Secret Sharing Schemes, Sequences II: Methods in Communication
-
Springer-Verlag. Positano, Italy
-
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, A Note on Secret Sharing Schemes, Sequences II: Methods in Communication, Security and Computer Science, Springer-Verlag. Positano, Italy, pp. 335-344, June 1991.
-
(1991)
Security and Computer Science
, pp. 335-344
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
10
-
-
0027607213
-
On the Size of Shares for Secret Sharing Schemes
-
R. M. СаросеШ, A. De Santis, L. Gargano, and U. Vaccaro, On the Size of Shares for Secret Sharing Schemes, Journal of Cryptology, Vol. 6, No. 3, Pag. 157-169, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.3
, pp. 157-169
-
-
Саросеш, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
11
-
-
0003968242
-
-
Coding Theorems for Discrete Mem-oryless Systems, Academic Press
-
I. Csiszár and J. Körner, Information Theory. Coding Theorems for Discrete Mem-oryless Systems, Academic Press, 1981.
-
(1981)
Information Theory
-
-
Csiszár, I.1
Körner, J.2
-
12
-
-
0004162159
-
-
A Collection of Surveys, Wiley-Interscience Series in Discrete Mathematics and Optimization
-
J. H. Dinitz and D. R. Stinson, Contemporary Design Theory. A Collection of Surveys, Wiley-Interscience Series in Discrete Mathematics and Optimization, 1992.
-
(1992)
Contemporary Design Theory
-
-
Dinitz, J.H.1
Stinson, D.R.2
-
14
-
-
0023545076
-
How to Play any Mental Game
-
O. Goldreich, S. Micali, and A. Wigderson, How to Play any Mental Game, Proceedings of 19th ACM Symp. on Theory of Computing, pp. 218-229, 1987.
-
(1987)
Proceedings of 19Th ACM Symp. on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
16
-
-
0023543848
-
Secret Sharing Scheme Realizing General Access Structure
-
Tokyo, Japan
-
M. Ito, A. Saito, and T. Nishizeki, Secret Sharing Scheme Realizing General Access Structure, Proceedings of IEEE Global Telecommunications Conference, Globecom 87, Tokyo, Japan, pp. 99-102, 1987.
-
(1987)
Proceedings of IEEE Global Telecommunications Conference, Globecom 87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
17
-
-
0020543282
-
On Secret Sharing Systems
-
E. D. Karnin, J. W. Greene, and M. E. Hellman, On Secret Sharing Systems, IEEE Trans, on Inform. Theory, Vol. IT-29, No. 1, pp. 35-41, Jan. 1983.
-
(1983)
IEEE Trans, on Inform. Theory
, vol.IT-29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
18
-
-
84894203891
-
A Time-Randomness Tradeoff for Oblivious Routing
-
D. Križane, D. Peleg, and E. Upfal, A Time-Randomness Tradeoff for Oblivious Routing, Proceedings of 20th Annual ACM Symposium on Theory of Computing”, pp. 93-102, 1988.
-
(1988)
Proceedings of 20Th Annual ACM Symposium on Theory of Computing”
, pp. 93-102
-
-
Križane, D.1
Peleg, D.2
Upfal, E.3
-
19
-
-
0002885219
-
New Secret Sharing Schemes from Old
-
K.M. Martin, New Secret Sharing Schemes from Old, J. Comb. Math. Comb. Comp. Vol. 14, pp. 65-77, 1993.
-
(1993)
J. Comb. Math. Comb. Comp
, vol.14
, pp. 65-77
-
-
Martin, K.M.1
-
20
-
-
0000427452
-
Threshold Schemes from Combinatorial Designs
-
P. J. Schellenberg and D. R. Stinson, Threshold Schemes from Combinatorial Designs, J. Combin. Math, and Combin. Computing, Vol. 5, pp. 143-160, 1989.
-
(1989)
J. Combin. Math, and Combin. Computing
, vol.5
, pp. 143-160
-
-
Schellenberg, P.J.1
Stinson, D.R.2
-
22
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, How to Share a Secret, Communications of the ACM, Vol. 22, n. 11, pp. 612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
0003038453
-
An Introduction to Shared Secret and/or Shared Control Schemes and Their Application, Contemporary Cryptology
-
G.J. Simmons, An Introduction to Shared Secret and/or Shared Control Schemes and Their Application, Contemporary Cryptology, IEEE Press, pp. 441-497, 1991.
-
(1991)
IEEE Press
, pp. 441-497
-
-
Simmons, G.J.1
-
24
-
-
85028945826
-
New General Lower Bounds on the Information Rate of Secret Sharing Schemes
-
Ed. E. Brickell, “Lecture Notes in Computer Science”, Springer-Verlag, Berlin
-
D. R. Stinson, New General Lower Bounds on the Information Rate of Secret Sharing Schemes, in “Advances in Cryptology - CRYPTO ‘92”, Ed. E. Brickell, “Lecture Notes in Computer Science”, Vol. 740, Springer-Verlag, Berlin, pp. 170-184, 1993.
-
(1993)
Advances in Cryptology - CRYPTO ‘92
, vol.740
, pp. 170-184
-
-
Stinson, D.R.1
-
25
-
-
0000708528
-
An Explication of Secret Sharing Schemes, Design
-
D. R. Stinson, An Explication of Secret Sharing Schemes, Design, Codes and Cryptography, Vol. 2, pp. 357-390, 1992.
-
(1992)
Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
26
-
-
0028323999
-
Decomposition Constructions for Secret Sharing Schemes
-
D. R. Stinson, Decomposition Constructions for Secret Sharing Schemes, IEEE Trans. Inform. Theory Vol. 40 (1994), pp. 118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 118-125
-
-
Stinson, D.R.1
-
27
-
-
0042655287
-
Combinatorial Designs and Cryptography
-
Walker Ed., Cambridge Univ. Press
-
D. R. Stinson, Combinatorial Designs and Cryptography, in “Surveys in Combinatorics, 1993”, K. Walker Ed., Cambridge Univ. Press, pp. 257-287.
-
Surveys in Combinatorics, 1993, K
, pp. 257-287
-
-
Stinson, D.R.1
-
28
-
-
0000248498
-
A Combinatorial Approach to Threshold Schemes
-
May
-
D. R. Stinson and A. Vanstone, A Combinatorial Approach to Threshold Schemes, SIAM J. Disc. Math., Vol. 1, May 1988, pp. 230-236.
-
(1988)
SIAM J. Disc. Math
, vol.1
, pp. 230-236
-
-
Stinson, D.R.1
Vanstone, A.2
|