On-Line Secret Sharing
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[2] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[3] László Csirmaz. The Size of a Share Must Be Large , 1994, EUROCRYPT.
[4] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[5] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..
[6] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[7] M. Smid,et al. Key escrowing today , 1994, IEEE Communications Magazine.
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] A. Beimel,et al. Lower bounds for monotone span programs , 2005, computational complexity.
[10] Silvio Micali,et al. Fair Public-Key Cryptosystems , 1992, CRYPTO.
[11] Giovanni Di Crescenzo,et al. Multi-Secret Sharing Schemes , 1994, CRYPTO.
[12] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[13] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1996, Theor. Comput. Sci..
[14] Alfredo De Santis,et al. On the Size of Shares for Secret Sharing Schemes , 1991, CRYPTO.
[15] László Csirmaz,et al. The Size of a Share Must Be Large , 1994, Journal of Cryptology.
[16] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[17] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[18] G. R. Blakley,et al. Threshold Schemes with Disenrollment , 1992, CRYPTO.
[19] J. Massey,et al. Threshold Schemes with Disenrollment , 1993, Proceedings. IEEE International Symposium on Information Theory.
[20] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .