The breadth of Shamir's secret-sharing scheme
暂无分享,去创建一个
[1] Albrecht Beutelspacher,et al. Geometric Structures as Threshold Schemes , 1986, EUROCRYPT.
[2] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[3] Gustavus J. Simmons,et al. A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party , 1991, EUROCRYPT.
[4] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[5] G. R. Blakley,et al. Threshold Schemes with Disenrollment , 1992, CRYPTO.
[6] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[9] Ernest F. Brickell,et al. The Detection of Cheaters in Threshold Schemes , 1990, SIAM J. Discret. Math..
[10] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[11] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[12] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.