On the size of shares for secret sharing schemes
暂无分享,去创建一个
Alfredo De Santis | Luisa Gargano | Ugo Vaccaro | Renato M. Capocelli | A. D. Santis | R. Capocelli | L. Gargano | U. Vaccaro
[1] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Douglas R Stinson,et al. Some improved bounds on the information rate of perfect secret sharing schemes , 1990, Journal of Cryptology.
[4] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[5] Alfredo De Santis,et al. Graph decompositions and secret sharing schemes , 2004, Journal of Cryptology.
[6] Ernest F. Brickell,et al. On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.
[7] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[8] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[9] Ernest F. Brickell,et al. Some improved bounds on the information rate of perfect secret sharing schemes , 2006, Journal of Cryptology.
[10] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[11] Suresh C. Kothari,et al. Generalized Linear Threshold Scheme , 1985, CRYPTO.
[12] Luisa Gargano,et al. A Note on Secret Sharing Schemes , 1993 .
[13] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[14] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[15] R. Gallager. Information Theory and Reliable Communication , 1968 .
[16] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[17] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.