Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme
暂无分享,去创建一个
[1] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[2] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[5] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[6] Hirosuke Yamamoto,et al. (k,L,n)Ramp Secret Sharing Systems for Functions , 2001 .
[7] Rafail Ostrovsky,et al. Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority , 2012, CRYPTO.
[8] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.