Framing in Secret Sharing
暂无分享,去创建一个
[1] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[2] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[3] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[4] Caroline J. Klivans. Threshold graphs, shifted complexes, and graphical complexes , 2007, Discret. Math..
[5] Alfred Lehman,et al. A Solution of the Shannon Switching Game , 1964 .
[6] James G. Oxley,et al. Matroid theory , 1992 .
[7] Tatiana Gvozdeva,et al. Weightedness and structural characterization of hierarchical simple games , 2013, Math. Soc. Sci..
[8] Kouya Tochikubo,et al. New Secret Sharing Schemes Realizing General Access Structures , 2015, J. Inf. Process..
[9] Paul D. Seymour. On secret-sharing matroids , 1992, J. Comb. Theory, Ser. B.
[10] Josep Freixas,et al. Complete simple games , 1996 .
[11] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[12] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[13] Tamir Tassa,et al. Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.
[14] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[15] Carles Padró,et al. Ideal Hierarchical Secret Sharing Schemes , 2010, IEEE Transactions on Information Theory.
[16] Yvo Desmedt,et al. Realistic versus Rational Secret Sharing , 2019, GameSec.
[17] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[18] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[19] Peter Sudhölter,et al. Directed and weighted majority games , 1995, Math. Methods Oper. Res..
[20] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[21] Piotr Faliszewski,et al. Cloning in Elections: Finding the Possible Winners , 2011, J. Artif. Intell. Res..
[22] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[23] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[24] Douglas R. Stinson,et al. Anonymous Secret Sharing Schemes , 1997, Discret. Appl. Math..
[25] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[26] Alan D. Taylor,et al. Simple Games , 2000 .
[27] Adi Shamir,et al. How to share a secret , 1979, CACM.
[28] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.
[29] C. L. Liu,et al. Introduction to Combinatorial Mathematics. , 1971 .
[30] Ernest F. Brickell,et al. On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.
[31] Gustavus J. Simmons,et al. Prepositioned Shared Secret and/or Shared Control Schemes , 1990, EUROCRYPT.