General Short Computational Secret Sharing Schemes
暂无分享,去创建一个
[1] Kaoru Kurosawa,et al. Nonperfect Secret Sharing Schemes and Matroids , 1994, EUROCRYPT.
[2] Toby Berger,et al. Review of Information Theory: Coding Theorems for Discrete Memoryless Systems (Csiszár, I., and Körner, J.; 1981) , 1984, IEEE Trans. Inf. Theory.
[3] Douglas R. Stinson,et al. Decomposition constructions for secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.
[4] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[5] Alfredo De Santis,et al. On the Information Rate of Secret Sharing Schemes (Extended Abstract) , 1992, CRYPTO.
[6] S. Tsujii,et al. Nonperfect Secret Sharing Schemes , 1992, AUSCRYPT.
[7] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[8] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[11] Moni Naor,et al. Optimal File Sharing in Distributed Networks , 1995, SIAM J. Comput..
[12] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.
[13] Alfredo De Santis,et al. On the Information Rate of Secret Sharing Schemes , 1996, Theor. Comput. Sci..
[14] R. Gallager. Information Theory and Reliable Communication , 1968 .
[15] Michael O. Rabin,et al. The information dispersal algorithm and its applications , 1990 .
[16] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[17] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[18] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[19] R. M. Capocelli. Sequences: combinatorics, compression, security, and transmission , 1990 .