An Information Theoretic Approach to Secret Sharing
暂无分享,去创建一个
[1] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[2] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[3] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[4] Shlomo Shamai,et al. A Vector Generalization of Costa's Entropy-Power Inequality With Applications , 2009, IEEE Transactions on Information Theory.
[5] A.K. Khandani,et al. Secure broadcasting : The secrecy rate region , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Shlomo Shamai,et al. Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[8] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[9] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[10] Moni Naor,et al. Access Control and Signatures via Quorum Secret Sharing , 1998, IEEE Trans. Parallel Distributed Syst..
[11] Shlomo Shamai,et al. The Capacity Region of the Degraded Multiple-Input Multiple-Output Compound Broadcast Channel , 2009, IEEE Transactions on Information Theory.
[12] Sennur Ulukus,et al. Degraded Compound Multi-Receiver Wiretap Channels , 2009, IEEE Transactions on Information Theory.
[13] Alfredo De Santis,et al. New bounds on the information rate of secret sharing schemes , 1995, IEEE Trans. Inf. Theory.
[14] Shlomo Shamai,et al. Secret sharing via noisy broadcast channels , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[15] Thomas M. Cover,et al. Network Information Theory , 2001 .
[16] Shlomo Shamai,et al. Layered decoding and secrecy over degraded broadcast channels , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[17] Michael O. Rabin,et al. Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[18] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[19] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[20] Mohammad Ali Maddah-Ali. On the degrees of freedom of the compound MISO broadcast channels with finite states , 2010, 2010 IEEE International Symposium on Information Theory.
[21] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[22] Shlomo Shamai,et al. On the compound MIMO broadcast channels with confidential messages , 2009, 2009 IEEE International Symposium on Information Theory.
[23] Max H. M. Costa,et al. A new entropy power inequality , 1985, IEEE Trans. Inf. Theory.
[24] K. Srinathan,et al. Alternative Protocols for Generalized Oblivious Transfer , 2008, ICDCN.
[25] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[26] Shlomo Shamai,et al. Layered secure broadcasting over MIMO channels and application in secret sharing , 2014, 2014 IEEE International Symposium on Information Theory.
[27] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.