Computationally perfect compartmented secret sharing schemes based on MDS codes
暂无分享,去创建一个
[1] K. Srinathan,et al. On the Power of Computational Secret Sharing , 2003, INDOCRYPT.
[2] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[3] V. Ch. Venkaiah,et al. Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes , 2014, SNDS.
[4] Josef Pieprzyk,et al. Secret Sharing in Multilevel and Compartmented Groups , 1998, ACISP.
[5] Tamir Tassa. Hierarchical Threshold Secret Sharing , 2004, TCC.
[6] Germán Sáez,et al. New Results on Multipartite Access Structures , 2006, IACR Cryptol. ePrint Arch..
[7] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[8] Carles Padró,et al. Natural Generalizations of Threshold Secret Sharing , 2011, IEEE Transactions on Information Theory.
[9] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[10] Ferruh Özbudak,et al. Secret Sharing Schemes and Linear Codes , 2012 .
[11] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[12] V. Ch. Venkaiah,et al. Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes , 2013, IACR Cryptol. ePrint Arch..
[13] Michael J. Collins. A Note on Ideal Tripartite Access Structures , 2002, IACR Cryptol. ePrint Arch..
[14] Siaw-Lynn Ng. Ideal secret sharing schemes with multipartite access structures , 2006 .
[15] Tamir Tassa,et al. Characterizing Ideal Weighted Threshold Secret Sharing , 2008, SIAM J. Discret. Math..
[16] Ali Aydin Selçuk,et al. Joint Compartmented Threshold Access Structures , 2013, IACR Cryptol. ePrint Arch..
[17] G. R. Blakley,et al. Ideal perfect threshold schemes and MDS codes , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[18] Appala Naidu Tentu,et al. Conjunctive Hierarchical Secret Sharing Scheme Based on MDS Codes , 2013, IWOCA.
[19] Ferruh Özbudak,et al. On Hierarchical Threshold Access Structures , 2010 .
[20] Nira Dyn,et al. Multipartite Secret Sharing by Bivariate Interpolation , 2008, Journal of Cryptology.
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.
[22] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[23] Carles Padró,et al. Ideal Multipartite Secret Sharing Schemes , 2007, Journal of Cryptology.