Span Programs over Rings and How to Share a Secret from a Module
暂无分享,去创建一个
[1] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[2] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[3] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[4] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[5] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.
[6] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[7] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[8] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Roy Dubisch,et al. Introduction to modern algebra , 1961 .