Scalable Threshold Closure
暂无分享,去创建一个
[1] Cunsheng Ding,et al. How to Build Robust Shared Control Systems , 1998, Des. Codes Cryptogr..
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Gustavus J. Simmons,et al. An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .
[4] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[5] James G. Oxley,et al. Matroid theory , 1992 .
[6] Cunsheng Ding,et al. The access structure of some secret-sharing schemes , 1996, ACISP.
[7] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[8] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[9] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[10] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[11] Douglas R. Stinson,et al. A Combinatorial Approach to Threshold Schemes , 1987, CRYPTO.
[12] Cunsheng Ding,et al. A nonlinear secret sharing scheme , 1996, ACISP.
[13] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[14] Douglas R. Stinson,et al. Anonymous Secret Sharing Schemes , 1997, Discret. Appl. Math..
[15] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[16] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.