-
1
-
-
0348106251
-
Threshold Schemes with Disenrollment
-
Ed. E. Brickell, “Lecture Notes in Computer Science”, Springer-Verlag
-
B. Blakley, G. R. Blakley, A. H. Chan, and J, Massey, Threshold Schemes with Disenrollment, in “Advances in Cryptology - CRYPTO '92", Ed. E. Brickell, “Lecture Notes in Computer Science”, Springer-Verlag.
-
Advances in Cryptology - CRYPTO '92
-
-
Blakley, B.1
Blakley, G.R.2
Chan, A.H.3
Massey, J.4
-
3
-
-
84921176272
-
On the Information Rate of Secret Sharing Schemes
-
Ed. E. Brickell, “Lecture Notes in Computer Science”, Springer-Verlag
-
C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, On the Information Rate of Secret Sharing Schemes, in “Advances in Cryptology - CRYPTO '92", Ed. E. Brickell, “Lecture Notes in Computer Science”, Springer-Verlag.
-
Advances in Cryptology - CRYPTO '92
-
-
Blundo, C.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
4
-
-
84885078522
-
Graph Decomposition and Secret Sharing Schemes
-
Lecture Notes in Computer Science, R. Rueppel Ed., Springer-Verlag
-
C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaio, Graph Decomposition and Secret Sharing Schemes, in “Advances in Cryptology - Eurocrypt '92", Lecture Notes in Computer Science, Vol. 658, R. Rueppel Ed., Springer-Verlag, pp. 1-24, 1993.
-
(1993)
Advances in Cryptology - Eurocrypt '92
, vol.658
, pp. 1-24
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaio, U.4
-
5
-
-
0000849681
-
On the Classification of Ideal Secret Sharing Schemes
-
E. F. Brickell and D. M. Davenport, On the Classification of Ideal Secret Sharing Schemes, J. Cryptology, Vol. 4, No. 2, pp. 123-134, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.2
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
6
-
-
0027607213
-
On the Size of Shares for Secret Sharing Schemes
-
R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaio, On the Size of Shares for Secret Sharing Schemes, Journal of Cryptology, Vol. 6, No. 3, pp. 157-169, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.3
, pp. 157-169
-
-
Capocelli, R.M.1
De Santis, A.2
Gargano, L.3
Vaccaio, U.4
-
7
-
-
0023545076
-
How to Play any Mental Game
-
O. Goldreich, S. Micali, and A. Wigderson, How to Play any Mental Game, Proceedings of 19th ACM Symp. on Theory of Computing, pp. 218-229, 1987.
-
(1987)
Proceedings of 19th ACM Symp. on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
8
-
-
0346185733
-
Dynamic Threshold Scheme based on the definition of Cross-Product in a N-dimensional Linear Space
-
Lecture Notes in Computer Science, J. Brassard Ed., Springer-Verlag
-
L. Ham, T. Hwang, C. Laih, and J. Lee, Dynamic Threshold Scheme based on the definition of Cross-Product in a N-dimensional Linear Space in “Advances in Cryptology - Eurocrypt '89", Lecture Notes in Computer Science, Vol. 435, J. Brassard Ed., Springer-Verlag, pp. 286-298.
-
Advances in Cryptology - Eurocrypt '89
, vol.435
, pp. 286-298
-
-
Ham, L.1
Hwang, T.2
Laih, C.3
Lee, J.4
-
9
-
-
0020543282
-
On Secret Sharing Systems
-
Jan.
-
E. D. Karnin, J. W. Greene, and M. E. Heilman, On Secret Sharing Systems, IEEE Trans, on Inform. Theory, Vol. IT-29, no. 1, pp. 35-41, Jan. 1983.
-
(1983)
IEEE Trans, on Inform. Theory
, vol.IT-29
, Issue.1
, pp. 35-41
-
-
Karnin, E.D.1
Greene, J.W.2
Heilman, M.E.3
-
12
-
-
0018545449
-
How to Share a Secret
-
Nov.
-
A. Shamir, How to Share a Secret, Communications of the ACM, Vol. 22, n. 11, pp. 612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
0003038453
-
An Introduction to Shared Secret and/or Shared Control Schemes and Their Application
-
G. J. Simmons, An Introduction to Shared Secret and/or Shared Control Schemes and Their Application, Contemporary Cryptology, IEEE Press, pp. 441-497, 1991.
-
(1991)
Contemporary Cryptology, IEEE Press
, pp. 441-497
-
-
Simmons, G.J.1
-
14
-
-
0001592017
-
How to (Really) Share a Secret
-
Ed. S. Goldwasser, “Lecture Notes in Computer Science”, Springer-Verlag
-
G. J. Simmons, How to (Really) Share a Secret, in “Advances in Cryptology - CRYPTO 88", Ed. S. Goldwasser, “Lecture Notes in Computer Science”, Springer-Verlag.
-
Advances in Cryptology - CRYPTO 88
-
-
Simmons, G.J.1
-
15
-
-
0003128147
-
The Geometry of Shared Secret Schemes
-
G. J. Simmons, W. Jackson, and K. Martin, The Geometry of Shared Secret Schemes, Bulletin of the ICA, Vol. 1, pp. 71-88, 1991.
-
(1991)
Bulletin of the ICA
, vol.1
, pp. 71-88
-
-
Simmons, G.J.1
Jackson, W.2
Martin, K.3
-
16
-
-
0000708528
-
An Explication of Secret Sharing Schemes
-
D. R. Stinson, An Explication of Secret Sharing Schemes, Design, Codes and Cryptography, Vol. 2, pp. 357-390, 1992.
-
(1992)
Design, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
17
-
-
85027396118
-
-
Technical Report UNL-CSE-92-020, Department of Computer Science and Engineering, University of Nebraska, September
-
D. R. Stinson, Decomposition Constructions for Secret Sharing Schemes, Technical Report UNL-CSE-92-020, Department of Computer Science and Engineering, University of Nebraska, September 1992.
-
(1992)
Decomposition Constructions for Secret Sharing Schemes
-
-
Stinson, D.R.1
|