Robust Additive Secret Sharing Schemes over Zm
暂无分享,去创建一个
[1] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[3] Giovanni Di Crescenzo,et al. Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography , 1994, ASIACRYPT.
[4] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[5] Douglas R Stinson,et al. Some recursive constructions for perfect hash families , 1996 .
[6] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[7] Yvo Desmedt,et al. Efficient Multiplicative Sharing Schemes , 1996, EUROCRYPT.
[8] Alfred V. Aho,et al. Data Structures and Algorithms , 1983 .
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Ernest F. Brickell,et al. The Detection of Cheaters in Threshold Schemes , 1988, CRYPTO.
[11] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[12] Clifford C. Cocks. Split Knowledge Generation of RSA Parameters , 1997, IMACC.
[13] Yvo Desmedt,et al. Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group , 1994, SIAM J. Discret. Math..
[14] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[15] Yair Frankel,et al. A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.
[16] Yvo Desmedt,et al. A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group , 1998, ACISP.
[17] Matthew K. Franklin,et al. Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.
[18] George Havas,et al. Perfect Hashing , 1997, Theor. Comput. Sci..