Efficient secret sharing schemes achieving optimal information rate
暂无分享,去创建一个
[1] Yvo Desmedt,et al. Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group , 1994, SIAM J. Discret. Math..
[2] Yongge Wang,et al. Privacy-Preserving Data Storage in Cloud Using Array BP-XOR Codes , 2015, IEEE Transactions on Cloud Computing.
[3] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[4] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[5] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[6] Ernest F. Brickell,et al. Some improved bounds on the information rate of perfect secret sharing schemes , 2006, Journal of Cryptology.
[7] Toshiaki Tanaka,et al. A New (k, n)-Threshold Secret Sharing Scheme and Its Extension , 2008, ISC.
[8] Josh Benaloh,et al. Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.
[9] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[10] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[13] G. R. Blakley,et al. Ideal perfect threshold schemes and MDS codes , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.
[14] Mario Blaum,et al. New array codes for multiple phased burst correction , 1993, IEEE Trans. Inf. Theory.
[15] R.M. Roth,et al. Lowest-density MDS codes over extension alphabets , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[16] Xiaoqi Jia,et al. Efficient Secret Sharing Schemes , 2011, STA.
[17] Yongge Wang,et al. Array BP-XOR codes for reliable cloud storage systems , 2013, 2013 IEEE International Symposium on Information Theory.
[18] Alfredo De Santis,et al. On the Size of Shares for Secret Sharing Schemes , 1991, CRYPTO.
[19] Kaoru Kurosawa,et al. The Round Complexity of Perfectly Secure General VSS , 2011, ICITS.
[20] R. Cramer,et al. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups , 2002 .
[21] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).