Rearrangements of access structures and their realizations in secret sharing schemes
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Secret Sharing Made Short , 1994, CRYPTO.
[2] Yuval Ishai,et al. On the power of nonlinear secret-sharing , 2001, Proceedings 16th Annual IEEE Conference on Computational Complexity.
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[6] Josef Pieprzyk,et al. Conditionally secure secret sharing schemes with disenrollment capability , 1994, CCS '94.
[7] Christian Cachin. On-Line Secret Sharing , 1995, IMACC.
[8] K. Srinathan,et al. On the Power of Computational Secret Sharing , 2003, INDOCRYPT.
[9] Douglas R. Stinson,et al. On the Dealer's Randomness Required in Secret Sharing Schemes , 1994, Des. Codes Cryptogr..
[10] Alfredo De Santis,et al. Tight Bounds on the Information Rate of Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[11] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1996, Theor. Comput. Sci..
[12] Philippe Béguin,et al. General Short Computational Secret Sharing Schemes , 1995, EUROCRYPT.
[13] Liang-liangXiao,et al. Linear Secret Sharing Schemes and Rearrangements of Access Structures , 2004 .
[14] Alfredo De Santis,et al. Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..