-
1
-
-
0040113669
-
Superpolynomial lower bounds for monotone span programs
-
Babai, L., Ǵal, A., Wigderson, A.: Superpolynomial lower bounds for monotone span programs. Combinatorica 19(3), 301-319 (1999)
-
(1999)
Combinatorica
, vol.19
, Issue.3
, pp. 301-319
-
-
Babai, L.1
Ǵal, A.2
Wigderson, A.3
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computations
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: Proc. of the 20th ACM Symp. on the Theory of Computing, pp. 1-10 (1988)
-
(1988)
Proc. of the 20th ACM Symp. on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
Goldwasser, S. (ed.) CRYPTO 1988 Springer, Heidelberg
-
Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 27-35. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
4
-
-
84984804645
-
A construction of practical secret sharing schemes using linear block codes
-
Zheng, Y., Seberry, J. (eds.)AUSCRYPT 1992 Springer, Heidelberg
-
Bertilsson, M., Ingemarsson, I.: A construction of practical secret sharing schemes using linear block codes. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 67-79. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.718
, pp. 67-79
-
-
Bertilsson, M.1
Ingemarsson, I.2
-
5
-
-
85062838317
-
Safeguarding cryptographic keys
-
Merwin, R.E., Zanca, J.T., Smith, M. (eds.) AFIPS Press
-
Blakley, G.R.: Safeguarding cryptographic keys. In: Merwin, R.E., Zanca, J.T., Smith, M. (eds.) Proc. of the 1979 AFIPS National Computer Conference. AFIPS Conference proceedings, vol. 48, pp. 313-317. AFIPS Press (1979)
-
(1979)
Proc. of the 1979 AFIPS National Computer Conference. AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
6
-
-
0029631974
-
Graph decompositions and secret sharing schemes
-
Blundo, C., De Santis, A., Stinson, D.R., Vaccaro, U.: Graph decompositions and secret sharing schemes. J. Cryptology 8(1), 39-64 (1995)
-
(1995)
J. Cryptology
, vol.8
, Issue.1
, pp. 39-64
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
8
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
Brickell, E.F., Davenport, D.M.: On the classification of ideal secret sharing schemes. J. of Cryptology 4(73), 123-134 (1991)
-
(1991)
J. of Cryptology
, vol.4
, Issue.73
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
9
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
Chaum, D., Cŕepeau, C., Damg?ard, I.: Multiparty unconditionally secure protocols. In: Proc. of the 20th ACM Symp. on the Theory of Computing, pp. 11-19 (1988)
-
(1988)
Proc. of the 20th ACM Symp. on the Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Cŕepeau, C.2
Damgard, I.3
-
10
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
Preneel, B. (ed.) EUROCRYPT 2000 Springer, Heidelberg
-
Cramer, R., Damg?ard, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316-334. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
-
11
-
-
0001607361
-
The size of a share must be large
-
Csirmaz, L.: The size of a share must be large. J. of Cryptology 10(4), 223-231 (1997)
-
(1997)
J. of Cryptology
, vol.10
, Issue.4
, pp. 223-231
-
-
Csirmaz, L.1
-
12
-
-
85022187530
-
Shared generation of authenticators and signatures
-
Feigenbaum, J. (ed.) CRYPTO 1991 Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457-469. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 457-469
-
-
Desmedt, Y.1
Frankel, Y.2
-
13
-
-
0003944144
-
A linear construction of secret sharing schemes
-
van Dijk, M.: A linear construction of secret sharing schemes. Designs, Codes and Cryptography 12(2), 161-201 (1997)
-
(1997)
Designs, Codes and Cryptography
, vol.12
, Issue.2
, pp. 161-201
-
-
Van Dijk, M.1
-
14
-
-
0002681234
-
A class of geometric lattices based on finite groups
-
Dowling, T.A.: A class of geometric lattices based on finite groups. J. Comb. Theory, Ser. B 14(1), 61-86 (1973)
-
(1973)
J. Comb. Theory, Ser. B
, vol.14
, Issue.1
, pp. 61-86
-
-
Dowling, T.A.1
-
16
-
-
0037699040
-
A characterization of span program size and improved lower bounds for monotone span programs
-
G?al, A.: A characterization of span program size and improved lower bounds for monotone span programs. Computational Complexity 10(4), 277-296 (2001)
-
(2001)
Computational Complexity
, vol.10
, Issue.4
, pp. 277-296
-
-
Gal, A.1
-
17
-
-
0042468042
-
A note on monotone complexity and the rank of matrices
-
G?al, A., Pudl?ak, P.: A note on monotone complexity and the rank of matrices. Inform. Process. Lett. 87, 321-326 (2003)
-
(2003)
Inform. Process. Lett.
, vol.87
, pp. 321-326
-
-
Gal, A.1
Pudlak, P.2
-
18
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Proc. of the 13th ACM Conference on Computer and Communications Security, pp. 89-98 (2006)
-
(2006)
Proc. of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
19
-
-
0023543848
-
Secret sharing schemes realizing general access structure
-
Ito, M., Saito, A., Nishizeki, T.: Secret sharing schemes realizing general access structure. In: Proc. of the IEEE Global Telecommunication Conf., Globecom 1987, pp. 99-102 (1987).
-
(1987)
Proc. of the IEEE Global Telecommunication Conf., Globecom 1987
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
20
-
-
0027289776
-
Journal version: Multiple assignment scheme for sharing secret
-
Journal version: Multiple assignment scheme for sharing secret. J. of Cryptology 6(1), 15-20 (1993)
-
(1993)
J. of Cryptology
, vol.6
, Issue.1
, pp. 15-20
-
-
-
22
-
-
0020543282
-
On secret sharing systems
-
Karnin, E.D., Greene, J.W., Hellman, M.E.: On secret sharing systems. IEEE Trans. on Information Theory 29(1), 35-41 (1983)
-
(1983)
IEEE Trans. on Information Theory
, vol.29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
23
-
-
0000985116
-
On the least prime in an arithmetic progression I. The basic theorem
-
Linnik, Y.V.: On the least prime in an arithmetic progression I. the basic theorem. Rec. Math (Mat. Sbornik) N.S. 15(57), 139-178 (1944)
-
(1944)
Rec. Math (Mat. Sbornik) N.S.
, vol.15
, Issue.57
, pp. 139-178
-
-
Linnik, Y.V.1
-
24
-
-
0012910692
-
On the least prime in an arithmetic progression II. The deuringheilbronn phenomenon
-
Linnik, Y.V.: On the least prime in an arithmetic progression II. the deuringheilbronn phenomenon. Rec. Math (Mat. Sbornik) N.S. 15(57), 347-368 (1944)
-
(1944)
Rec. Math (Mat. Sbornik) N.S.
, vol.15
, Issue.57
, pp. 347-368
-
-
Linnik, Y.V.1
-
25
-
-
79959310457
-
On secret sharing schemes, matroids and polymatroids
-
Mart-Farr?e, J., Padr?o, C.: On secret sharing schemes, matroids and polymatroids. Journal of Mathematical Cryptology 4(2), 95-120 (2010)
-
(2010)
Journal of Mathematical Cryptology
, vol.4
, Issue.2
, pp. 95-120
-
-
Mart-Farre, J.1
Padro, C.2
-
26
-
-
0345884729
-
Matroid representations by partitions
-
Mat?u?s, F.: Matroid representations by partitions. Discrete Mathematics 203, 169-194 (1999)
-
(1999)
Discrete Mathematics
, vol.203
, pp. 169-194
-
-
Matus, F.1
-
29
-
-
0004061262
-
-
2nd edn Oxford University Press
-
Oxley, J.G.: Matroid Theory, 2nd edn. Oxford University Press (2011)
-
(2011)
Matroid Theory
-
-
Oxley, J.G.1
-
30
-
-
84869502444
-
Skew partial fields, multilinear representations of matroids, and a matrix tree theorem
-
Pendavingh, R.A., van Zwam, S.H.M.: Skew partial fields, multilinear representations of matroids, and a matrix tree theorem. Advances in Applied Mathematics 50(1), 201-227 (2013)
-
(2013)
Advances in Applied Mathematics
, vol.50
, Issue.1
, pp. 201-227
-
-
Pendavingh, R.A.1
Van Zwam, S.H.M.2
-
31
-
-
0030160058
-
Partial fields and matroid representation
-
Semple, C., Whittle, G.: Partial fields and matroid representation. Advances in Applied Mathematics 17(2), 184-208 (1996)
-
(1996)
Advances in Applied Mathematics
, vol.17
, Issue.2
, pp. 184-208
-
-
Semple, C.1
Whittle, G.2
-
34
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
35
-
-
39149127324
-
Alternative protocols for generalized oblivious transfer
-
Rao, S., Chatterjee, M., Jayanti, P., Murthy, C.S.R., Saha, S.K. (eds.) ICDCN 2008 Springer, Heidelberg
-
Shankar, B., Srinathan, K., Rangan, C.P.: Alternative protocols for generalized oblivious transfer. In: Rao, S., Chatterjee, M., Jayanti, P., Murthy, C.S.R., Saha, S.K. (eds.) ICDCN 2008. LNCS, vol. 4904, pp. 304-309. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4904
, pp. 304-309
-
-
Shankar, B.1
Srinathan, K.2
Rangan, C.P.3
-
36
-
-
0011309023
-
Almost affine codes
-
Simonis, J., Ashikhmin, A.: Almost affine codes. Designs, Codes and Cryptography 14(2), 179-197 (1998)
-
(1998)
Designs, Codes and Cryptography
, vol.14
, Issue.2
, pp. 179-197
-
-
Simonis, J.1
Ashikhmin, A.2
-
37
-
-
0028323999
-
Decomposition construction for secret sharing schemes
-
Stinson, D.R.: Decomposition construction for secret sharing schemes. IEEE Trans. on Information Theory 40(1), 118-125 (1994)
-
(1994)
IEEE Trans. on Information Theory
, vol.40
, Issue.1
, pp. 118-125
-
-
Stinson, D.R.1
-
38
-
-
79551472032
-
Generalized oblivious transfer by secret sharing
-
Tassa, T.: Generalized oblivious transfer by secret sharing. Des. Codes Cryptography 58(1), 11-21 (2011)
-
(2011)
Des. Codes Cryptography
, vol.58
, Issue.1
, pp. 11-21
-
-
Tassa, T.1
-
39
-
-
0141948319
-
A general decomposition construction for incomplete secret sharing schemes
-
van Dijk, M., Jackson, W.-A., Martin, K.M.: A general decomposition construction for incomplete secret sharing schemes. Des. Codes Cryptography 15(3), 301-321 (1998)
-
(1998)
Des. Codes Cryptography
, vol.15
, Issue.3
, pp. 301-321
-
-
Van Dijk, M.1
Jackson, W.-A.2
Martin, K.M.3
-
40
-
-
33744546371
-
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions
-
van Dijk, M., Kevenaar, T.A.M., Schrijen, G.J., Tuyls, P.: Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions. Inform. Process. Lett. 99(4), 154-157 (2006)
-
(2006)
Inform. Process. Lett.
, vol.99
, Issue.4
, pp. 154-157
-
-
Van Dijk, M.1
Kevenaar, T.A.M.2
Schrijen, G.J.3
Tuyls, P.4
-
41
-
-
51249192600
-
Les groupes lineaires finis sans point fixes
-
Vincent, G.: Les groupes lineaires finis sans point fixes. Commentarii Mathematici Helvetici 20, 117-171 (1947)
-
(1947)
Commentarii Mathematici Helvetici
, vol.20
, pp. 117-171
-
-
Vincent, G.1
-
42
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011 Springer, Heidelberg
-
Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
44
-
-
80051706608
-
On the least prime in an arithmetic progression and estimates for the zeros of Dirichlet L-functions
-
Xylouris, T.: On the least prime in an arithmetic progression and estimates for the zeros of Dirichlet L-functions. Acta Arith. 150(1), 65-91 (2011)
-
(2011)
Acta Arith.
, vol.150
, Issue.1
, pp. 65-91
-
-
Xylouris, T.1
-
45
-
-
0000574815
-
-
Abhandlungen aus dem Mathematischen Seminar der Hamburgischen Universitat
-
Zassenhaus, H.: Uber endliche faskorper. Abhandlungen aus dem Mathematischen Seminar der Hamburgischen Universitat 11, 187-220 (1935)
-
(1935)
Uber Endliche Faskorper
, vol.11
, pp. 187-220
-
-
Zassenhaus, H.1
|