t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes
暂无分享,去创建一个
[1] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[2] Alfredo De Santis,et al. Size of Shares and Probability of Cheating in Threshold Schemes , 1994, EUROCRYPT.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[5] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[6] Kaoru Kurosawa,et al. Combinatorial Interpretation of Secret Sharing Schemes , 1994, ASIACRYPT.
[7] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[8] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[9] J. L. Massey,et al. Cryptography ― a selective survey , 1986 .
[10] Alfredo De Santis,et al. On the Size of Shares for Secret Sharing Schemes , 1991, CRYPTO.
[11] Douglas R. Stinson. Some Constructions and Bounds for authentication Codes , 1986, CRYPTO.
[12] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[13] Ernest F. Brickell,et al. The Detection of Cheaters in Threshold Schemes , 1990, SIAM J. Discret. Math..