-
1
-
-
85027202957
-
Generalized Secret Sharing and Monotone Functions
-
J. C. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, Crypto 88, pp. 27-35.
-
Crypto 88
, pp. 27-35
-
-
Benaloh, J.C.1
Leichter, J.2
-
3
-
-
85029472520
-
On the Classification of Ideal Secret Sharing Schemes
-
to appear
-
E. F. Brickell and D. M. Davenport, On the Classification of Ideal Secret Sharing Schemes, J. Cryptology, to appear.
-
J. Cryptology
-
-
Brickell, E.F.1
Davenport, D.M.2
-
4
-
-
85029540293
-
Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes
-
(Published also as Research Report #106, May 1990, University of Nebraska)
-
E. F. Brickell and D. R. Stinson, Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes, Crypto 90 (Published also as Research Report #106, May 1990, University of Nebraska).
-
Crypto 90
-
-
Brickell, E.F.1
Stinson, D.R.2
-
8
-
-
0023545076
-
Bow to Play Any Mental Game
-
New York
-
O. Goldreich, S. Micali, and A. Wigderson, Bow to Play Any Mental Game, Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, New York, pp. 218-229.
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
9
-
-
0023543848
-
Secret Skaring Scheme Realizing General Access Structure
-
Tokyo, Japan
-
M. Ito, A. Saito, and T. Nishizeki, Secret Skaring Scheme Realizing General Access Structure, Proc. IEEE Global Telecommunications Conf., Globecom 87, Tokyo, Japan, 1987, pp. 99-102.
-
(1987)
Proc. IEEE Global Telecommunications Conf., Globecom 87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
10
-
-
0020543282
-
On Secret Sharing Systems
-
Jan
-
E. D. Kamin, J. W. Greene, and M. E. Hellman, On Secret Sharing Systems, IEEE Trans, on Inform. Theory, vol. IT-29, no. 1, Jan. 1983, pp. 35-41.
-
(1983)
IEEE Trans, on Inform. Theory
, vol.IT-29
, Issue.1
, pp. 35-41
-
-
Kamin, E.D.1
Greene, J.W.2
Hellman, M.E.3
-
11
-
-
85023433586
-
Generalized Linear Threshold Schemes
-
S. C. Kothari, Generalized Linear Threshold Schemes, Crypto 84, pp. 231-241.
-
Crypto 84
, pp. 231-241
-
-
Kothari, S.C.1
-
12
-
-
0018545449
-
How to Share a Secret
-
Nov
-
A. Shamir, How to Share a Secret, Communications of the ACM, vol. 22, n. 11, pp. 612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
84940644968
-
The Mathematical Theory of Communication
-
July/Oct
-
C. E. Shannon, The Mathematical Theory of Communication, Bell. Syst. J., vol. 27, pp. 379-423, 623-656, July/Oct. 1948.
-
(1948)
Bell. Syst. J
, vol.27
-
-
Shannon, C.E.1
-
14
-
-
0005180192
-
Robust Shared Secret Schemes or “How to be Sure You Have the Right Answer even though You don’t Know the Question”
-
G.J. Simmons, Robust Shared Secret Schemes or “How to be Sure You Have the Right Answer even though You don’t Know the Question”, Congressus Numeran-tium, vol. 8, pp. 215-248, 1989.
-
(1989)
Congressus Numeran-tium
, vol.8
, pp. 215-248
-
-
Simmons, G.J.1
|