On Multiplicative Secret Sharing Schemes
暂无分享,去创建一个
[1] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[2] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] George Havas,et al. Perfect Hashing , 1997, Theor. Comput. Sci..
[5] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[6] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[7] Yvo Desmedt,et al. Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group , 1994, SIAM J. Discret. Math..
[8] Giovanni Di Crescenzo,et al. Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography , 1994, ASIACRYPT.
[9] Andrew Odlyzko,et al. Advances in Cryptology — CRYPTO’ 86 , 2000, Lecture Notes in Computer Science.
[10] Douglas R Stinson,et al. Some recursive constructions for perfect hash families , 1996 .
[11] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[12] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[13] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[14] Yvo Desmedt,et al. Efficient Multiplicative Sharing Schemes , 1996, EUROCRYPT.
[15] Tsutomu Matsumoto,et al. Incidence structures for key sharing , 1995 .
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] Keith M. Martin,et al. Mutually Trusted Authority-Free Secret Sharing Schemes , 1997, Journal of Cryptology.
[18] Alfred V. Aho,et al. Data Structures and Algorithms , 1983 .