Some improved bounds on the information rate of perfect secret sharing schemes
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Hanfried Lenz,et al. Design theory , 1985 .
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] Douglas R. Stinson,et al. Recent results on combinatorial constructions for threshold schemes , 1990, Australas. J Comb..
[5] Douglas R. Stinson,et al. A Combinatorial Approach to Threshold Schemes , 1987, SIAM J. Discret. Math..
[6] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[7] Alfredo De Santis,et al. On the Size of Shares for Secret Sharing Schemes , 1991, CRYPTO.
[8] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[9] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.